cjson
fuzzing
inputs
test1 test10 test11 test2 test3 test3.bu test3.uf test3.uu test4 test5 test6 test7 test8 test9library_config
cJSONConfig.cmake.in cJSONConfigVersion.cmake.in libcjson.pc.in libcjson_utils.pc.in uninstall.cmaketests
inputs
test1 test1.expected test10 test10.expected test11 test11.expected test2 test2.expected test3 test3.expected test4 test4.expected test5 test5.expected test6 test7 test7.expected test8 test8.expected test9 test9.expectedjson-patch-tests
.editorconfig .gitignore .npmignore README.md cjson-utils-tests.json package.json spec_tests.json tests.jsonunity
auto
colour_prompt.rb colour_reporter.rb generate_config.yml generate_module.rb generate_test_runner.rb parse_output.rb stylize_as_junit.rb test_file_filter.rb type_sanitizer.rb unity_test_summary.py unity_test_summary.rb unity_to_junit.pydocs
ThrowTheSwitchCodingStandard.md UnityAssertionsCheatSheetSuitableforPrintingandPossiblyFraming.pdf UnityAssertionsReference.md UnityConfigurationGuide.md UnityGettingStartedGuide.md UnityHelperScriptsGuide.md license.txtexamples
unity_config.hcurl
.github
scripts
cleancmd.pl cmp-config.pl cmp-pkg-config.sh codespell-ignore.words codespell.sh distfiles.sh pyspelling.words pyspelling.yaml randcurl.pl requirements-docs.txt requirements-proselint.txt requirements.txt shellcheck-ci.sh shellcheck.sh spellcheck.curl trimmarkdownheader.pl typos.sh typos.toml verify-examples.pl verify-synopsis.pl yamlcheck.sh yamlcheck.yamlworkflows
appveyor-status.yml checkdocs.yml checksrc.yml checkurls.yml codeql.yml configure-vs-cmake.yml curl-for-win.yml distcheck.yml fuzz.yml http3-linux.yml label.yml linux-old.yml linux.yml macos.yml non-native.yml windows.ymlCMake
CurlSymbolHiding.cmake CurlTests.c FindBrotli.cmake FindCares.cmake FindGSS.cmake FindGnuTLS.cmake FindLDAP.cmake FindLibbacktrace.cmake FindLibgsasl.cmake FindLibidn2.cmake FindLibpsl.cmake FindLibssh.cmake FindLibssh2.cmake FindLibuv.cmake FindMbedTLS.cmake FindNGHTTP2.cmake FindNGHTTP3.cmake FindNGTCP2.cmake FindNettle.cmake FindQuiche.cmake FindRustls.cmake FindWolfSSL.cmake FindZstd.cmake Macros.cmake OtherTests.cmake PickyWarnings.cmake Utilities.cmake cmake_uninstall.in.cmake curl-config.in.cmake unix-cache.cmake win32-cache.cmakedocs
cmdline-opts
.gitignore CMakeLists.txt MANPAGE.md Makefile.am Makefile.inc _AUTHORS.md _BUGS.md _DESCRIPTION.md _ENVIRONMENT.md _EXITCODES.md _FILES.md _GLOBBING.md _NAME.md _OPTIONS.md _OUTPUT.md _PROGRESS.md _PROTOCOLS.md _PROXYPREFIX.md _SEEALSO.md _SYNOPSIS.md _URL.md _VARIABLES.md _VERSION.md _WWW.md abstract-unix-socket.md alt-svc.md anyauth.md append.md aws-sigv4.md basic.md ca-native.md cacert.md capath.md cert-status.md cert-type.md cert.md ciphers.md compressed-ssh.md compressed.md config.md connect-timeout.md connect-to.md continue-at.md cookie-jar.md cookie.md create-dirs.md create-file-mode.md crlf.md crlfile.md curves.md data-ascii.md data-binary.md data-raw.md data-urlencode.md data.md delegation.md digest.md disable-eprt.md disable-epsv.md disable.md disallow-username-in-url.md dns-interface.md dns-ipv4-addr.md dns-ipv6-addr.md dns-servers.md doh-cert-status.md doh-insecure.md doh-url.md dump-ca-embed.md dump-header.md ech.md egd-file.md engine.md etag-compare.md etag-save.md expect100-timeout.md fail-early.md fail-with-body.md fail.md false-start.md follow.md form-escape.md form-string.md form.md ftp-account.md ftp-alternative-to-user.md ftp-create-dirs.md ftp-method.md ftp-pasv.md ftp-port.md ftp-pret.md ftp-skip-pasv-ip.md ftp-ssl-ccc-mode.md ftp-ssl-ccc.md ftp-ssl-control.md get.md globoff.md happy-eyeballs-timeout-ms.md haproxy-clientip.md haproxy-protocol.md head.md header.md help.md hostpubmd5.md hostpubsha256.md hsts.md http0.9.md http1.0.md http1.1.md http2-prior-knowledge.md http2.md http3-only.md http3.md ignore-content-length.md insecure.md interface.md ip-tos.md ipfs-gateway.md ipv4.md ipv6.md json.md junk-session-cookies.md keepalive-cnt.md keepalive-time.md key-type.md key.md knownhosts.md krb.md libcurl.md limit-rate.md list-only.md local-port.md location-trusted.md location.md login-options.md mail-auth.md mail-from.md mail-rcpt-allowfails.md mail-rcpt.md mainpage.idx manual.md max-filesize.md max-redirs.md max-time.md metalink.md mptcp.md negotiate.md netrc-file.md netrc-optional.md netrc.md next.md no-alpn.md no-buffer.md no-clobber.md no-keepalive.md no-npn.md no-progress-meter.md no-sessionid.md noproxy.md ntlm-wb.md ntlm.md oauth2-bearer.md out-null.md output-dir.md output.md parallel-immediate.md parallel-max-host.md parallel-max.md parallel.md pass.md path-as-is.md pinnedpubkey.md post301.md post302.md post303.md preproxy.md progress-bar.md proto-default.md proto-redir.md proto.md proxy-anyauth.md proxy-basic.md proxy-ca-native.md proxy-cacert.md proxy-capath.md proxy-cert-type.md proxy-cert.md proxy-ciphers.md proxy-crlfile.md proxy-digest.md proxy-header.md proxy-http2.md proxy-insecure.md proxy-key-type.md proxy-key.md proxy-negotiate.md proxy-ntlm.md proxy-pass.md proxy-pinnedpubkey.md proxy-service-name.md proxy-ssl-allow-beast.md proxy-ssl-auto-client-cert.md proxy-tls13-ciphers.md proxy-tlsauthtype.md proxy-tlspassword.md proxy-tlsuser.md proxy-tlsv1.md proxy-user.md proxy.md proxy1.0.md proxytunnel.md pubkey.md quote.md random-file.md range.md rate.md raw.md referer.md remote-header-name.md remote-name-all.md remote-name.md remote-time.md remove-on-error.md request-target.md request.md resolve.md retry-all-errors.md retry-connrefused.md retry-delay.md retry-max-time.md retry.md sasl-authzid.md sasl-ir.md service-name.md show-error.md show-headers.md sigalgs.md silent.md skip-existing.md socks4.md socks4a.md socks5-basic.md socks5-gssapi-nec.md socks5-gssapi-service.md socks5-gssapi.md socks5-hostname.md socks5.md speed-limit.md speed-time.md ssl-allow-beast.md ssl-auto-client-cert.md ssl-no-revoke.md ssl-reqd.md ssl-revoke-best-effort.md ssl-sessions.md ssl.md sslv2.md sslv3.md stderr.md styled-output.md suppress-connect-headers.md tcp-fastopen.md tcp-nodelay.md telnet-option.md tftp-blksize.md tftp-no-options.md time-cond.md tls-earlydata.md tls-max.md tls13-ciphers.md tlsauthtype.md tlspassword.md tlsuser.md tlsv1.0.md tlsv1.1.md tlsv1.2.md tlsv1.3.md tlsv1.md tr-encoding.md trace-ascii.md trace-config.md trace-ids.md trace-time.md trace.md unix-socket.md upload-file.md upload-flags.md url-query.md url.md use-ascii.md user-agent.md user.md variable.md verbose.md version.md vlan-priority.md write-out.md xattr.mdexamples
.checksrc .gitignore 10-at-a-time.c CMakeLists.txt Makefile.am Makefile.example Makefile.inc README.md adddocsref.pl address-scope.c altsvc.c anyauthput.c block_ip.c cacertinmem.c certinfo.c chkspeed.c connect-to.c cookie_interface.c crawler.c debug.c default-scheme.c ephiperfifo.c evhiperfifo.c externalsocket.c fileupload.c ftp-delete.c ftp-wildcard.c ftpget.c ftpgetinfo.c ftpgetresp.c ftpsget.c ftpupload.c ftpuploadfrommem.c ftpuploadresume.c getinfo.c getinmemory.c getredirect.c getreferrer.c ghiper.c headerapi.c hiperfifo.c hsts-preload.c htmltidy.c htmltitle.cpp http-options.c http-post.c http2-download.c http2-pushinmemory.c http2-serverpush.c http2-upload.c http3-present.c http3.c httpcustomheader.c httpput-postfields.c httpput.c https.c imap-append.c imap-authzid.c imap-copy.c imap-create.c imap-delete.c imap-examine.c imap-fetch.c imap-list.c imap-lsub.c imap-multi.c imap-noop.c imap-search.c imap-ssl.c imap-store.c imap-tls.c interface.c ipv6.c keepalive.c localport.c log_failed_transfers.c maxconnects.c multi-app.c multi-debugcallback.c multi-double.c multi-event.c multi-formadd.c multi-legacy.c multi-post.c multi-single.c multi-uv.c netrc.c parseurl.c persistent.c pop3-authzid.c pop3-dele.c pop3-list.c pop3-multi.c pop3-noop.c pop3-retr.c pop3-ssl.c pop3-stat.c pop3-tls.c pop3-top.c pop3-uidl.c post-callback.c postinmemory.c postit2-formadd.c postit2.c progressfunc.c protofeats.c range.c resolve.c rtsp-options.c sendrecv.c sepheaders.c sessioninfo.c sftpget.c sftpuploadresume.c shared-connection-cache.c simple.c simplepost.c simplessl.c smooth-gtk-thread.c smtp-authzid.c smtp-expn.c smtp-mail.c smtp-mime.c smtp-multi.c smtp-ssl.c smtp-tls.c smtp-vrfy.c sslbackend.c synctime.c threaded.c unixsocket.c url2file.c urlapi.c usercertinmem.c version-check.pl websocket-cb.c websocket-updown.c websocket.c xmlstream.cinternals
BUFQ.md BUFREF.md CHECKSRC.md CLIENT-READERS.md CLIENT-WRITERS.md CODE_STYLE.md CONNECTION-FILTERS.md CREDENTIALS.md CURLX.md DYNBUF.md HASH.md LLIST.md MID.md MQTT.md MULTI-EV.md NEW-PROTOCOL.md PEERS.md PORTING.md RATELIMITS.md README.md SCORECARD.md SPLAY.md STRPARSE.md THRDPOOL-AND-QUEUE.md TIME-KEEPING.md TLS-SESSIONS.md UINT_SETS.md WEBSOCKET.mdlibcurl
opts
CMakeLists.txt CURLINFO_ACTIVESOCKET.md CURLINFO_APPCONNECT_TIME.md CURLINFO_APPCONNECT_TIME_T.md CURLINFO_CAINFO.md CURLINFO_CAPATH.md CURLINFO_CERTINFO.md CURLINFO_CONDITION_UNMET.md CURLINFO_CONNECT_TIME.md CURLINFO_CONNECT_TIME_T.md CURLINFO_CONN_ID.md CURLINFO_CONTENT_LENGTH_DOWNLOAD.md CURLINFO_CONTENT_LENGTH_DOWNLOAD_T.md CURLINFO_CONTENT_LENGTH_UPLOAD.md CURLINFO_CONTENT_LENGTH_UPLOAD_T.md CURLINFO_CONTENT_TYPE.md CURLINFO_COOKIELIST.md CURLINFO_EARLYDATA_SENT_T.md CURLINFO_EFFECTIVE_METHOD.md CURLINFO_EFFECTIVE_URL.md CURLINFO_FILETIME.md CURLINFO_FILETIME_T.md CURLINFO_FTP_ENTRY_PATH.md CURLINFO_HEADER_SIZE.md CURLINFO_HTTPAUTH_AVAIL.md CURLINFO_HTTPAUTH_USED.md CURLINFO_HTTP_CONNECTCODE.md CURLINFO_HTTP_VERSION.md CURLINFO_LASTSOCKET.md CURLINFO_LOCAL_IP.md CURLINFO_LOCAL_PORT.md CURLINFO_NAMELOOKUP_TIME.md CURLINFO_NAMELOOKUP_TIME_T.md CURLINFO_NUM_CONNECTS.md CURLINFO_OS_ERRNO.md CURLINFO_POSTTRANSFER_TIME_T.md CURLINFO_PRETRANSFER_TIME.md CURLINFO_PRETRANSFER_TIME_T.md CURLINFO_PRIMARY_IP.md CURLINFO_PRIMARY_PORT.md CURLINFO_PRIVATE.md CURLINFO_PROTOCOL.md CURLINFO_PROXYAUTH_AVAIL.md CURLINFO_PROXYAUTH_USED.md CURLINFO_PROXY_ERROR.md CURLINFO_PROXY_SSL_VERIFYRESULT.md CURLINFO_QUEUE_TIME_T.md CURLINFO_REDIRECT_COUNT.md CURLINFO_REDIRECT_TIME.md CURLINFO_REDIRECT_TIME_T.md CURLINFO_REDIRECT_URL.md CURLINFO_REFERER.md CURLINFO_REQUEST_SIZE.md CURLINFO_RESPONSE_CODE.md CURLINFO_RETRY_AFTER.md CURLINFO_RTSP_CLIENT_CSEQ.md CURLINFO_RTSP_CSEQ_RECV.md CURLINFO_RTSP_SERVER_CSEQ.md CURLINFO_RTSP_SESSION_ID.md CURLINFO_SCHEME.md CURLINFO_SIZE_DELIVERED.md CURLINFO_SIZE_DOWNLOAD.md CURLINFO_SIZE_DOWNLOAD_T.md CURLINFO_SIZE_UPLOAD.md CURLINFO_SIZE_UPLOAD_T.md CURLINFO_SPEED_DOWNLOAD.md CURLINFO_SPEED_DOWNLOAD_T.md CURLINFO_SPEED_UPLOAD.md CURLINFO_SPEED_UPLOAD_T.md CURLINFO_SSL_ENGINES.md CURLINFO_SSL_VERIFYRESULT.md CURLINFO_STARTTRANSFER_TIME.md CURLINFO_STARTTRANSFER_TIME_T.md CURLINFO_TLS_SESSION.md CURLINFO_TLS_SSL_PTR.md CURLINFO_TOTAL_TIME.md CURLINFO_TOTAL_TIME_T.md CURLINFO_USED_PROXY.md CURLINFO_XFER_ID.md CURLMINFO_XFERS_ADDED.md CURLMINFO_XFERS_CURRENT.md CURLMINFO_XFERS_DONE.md CURLMINFO_XFERS_PENDING.md CURLMINFO_XFERS_RUNNING.md CURLMOPT_CHUNK_LENGTH_PENALTY_SIZE.md CURLMOPT_CONTENT_LENGTH_PENALTY_SIZE.md CURLMOPT_MAXCONNECTS.md CURLMOPT_MAX_CONCURRENT_STREAMS.md CURLMOPT_MAX_HOST_CONNECTIONS.md CURLMOPT_MAX_PIPELINE_LENGTH.md CURLMOPT_MAX_TOTAL_CONNECTIONS.md CURLMOPT_NETWORK_CHANGED.md CURLMOPT_NOTIFYDATA.md CURLMOPT_NOTIFYFUNCTION.md CURLMOPT_PIPELINING.md CURLMOPT_PIPELINING_SERVER_BL.md CURLMOPT_PIPELINING_SITE_BL.md CURLMOPT_PUSHDATA.md CURLMOPT_PUSHFUNCTION.md CURLMOPT_QUICK_EXIT.md CURLMOPT_RESOLVE_THREADS_MAX.md CURLMOPT_SOCKETDATA.md CURLMOPT_SOCKETFUNCTION.md CURLMOPT_TIMERDATA.md CURLMOPT_TIMERFUNCTION.md CURLOPT_ABSTRACT_UNIX_SOCKET.md CURLOPT_ACCEPTTIMEOUT_MS.md CURLOPT_ACCEPT_ENCODING.md CURLOPT_ADDRESS_SCOPE.md CURLOPT_ALTSVC.md CURLOPT_ALTSVC_CTRL.md CURLOPT_APPEND.md CURLOPT_AUTOREFERER.md CURLOPT_AWS_SIGV4.md CURLOPT_BUFFERSIZE.md CURLOPT_CAINFO.md CURLOPT_CAINFO_BLOB.md CURLOPT_CAPATH.md CURLOPT_CA_CACHE_TIMEOUT.md CURLOPT_CERTINFO.md CURLOPT_CHUNK_BGN_FUNCTION.md CURLOPT_CHUNK_DATA.md CURLOPT_CHUNK_END_FUNCTION.md CURLOPT_CLOSESOCKETDATA.md CURLOPT_CLOSESOCKETFUNCTION.md CURLOPT_CONNECTTIMEOUT.md CURLOPT_CONNECTTIMEOUT_MS.md CURLOPT_CONNECT_ONLY.md CURLOPT_CONNECT_TO.md CURLOPT_CONV_FROM_NETWORK_FUNCTION.md CURLOPT_CONV_FROM_UTF8_FUNCTION.md CURLOPT_CONV_TO_NETWORK_FUNCTION.md CURLOPT_COOKIE.md CURLOPT_COOKIEFILE.md CURLOPT_COOKIEJAR.md CURLOPT_COOKIELIST.md CURLOPT_COOKIESESSION.md CURLOPT_COPYPOSTFIELDS.md CURLOPT_CRLF.md CURLOPT_CRLFILE.md CURLOPT_CURLU.md CURLOPT_CUSTOMREQUEST.md CURLOPT_DEBUGDATA.md CURLOPT_DEBUGFUNCTION.md CURLOPT_DEFAULT_PROTOCOL.md CURLOPT_DIRLISTONLY.md CURLOPT_DISALLOW_USERNAME_IN_URL.md CURLOPT_DNS_CACHE_TIMEOUT.md CURLOPT_DNS_INTERFACE.md CURLOPT_DNS_LOCAL_IP4.md CURLOPT_DNS_LOCAL_IP6.md CURLOPT_DNS_SERVERS.md CURLOPT_DNS_SHUFFLE_ADDRESSES.md CURLOPT_DNS_USE_GLOBAL_CACHE.md CURLOPT_DOH_SSL_VERIFYHOST.md CURLOPT_DOH_SSL_VERIFYPEER.md CURLOPT_DOH_SSL_VERIFYSTATUS.md CURLOPT_DOH_URL.md CURLOPT_ECH.md CURLOPT_EGDSOCKET.md CURLOPT_ERRORBUFFER.md CURLOPT_EXPECT_100_TIMEOUT_MS.md CURLOPT_FAILONERROR.md CURLOPT_FILETIME.md CURLOPT_FNMATCH_DATA.md CURLOPT_FNMATCH_FUNCTION.md CURLOPT_FOLLOWLOCATION.md CURLOPT_FORBID_REUSE.md CURLOPT_FRESH_CONNECT.md CURLOPT_FTPPORT.md CURLOPT_FTPSSLAUTH.md CURLOPT_FTP_ACCOUNT.md CURLOPT_FTP_ALTERNATIVE_TO_USER.md CURLOPT_FTP_CREATE_MISSING_DIRS.md CURLOPT_FTP_FILEMETHOD.md CURLOPT_FTP_SKIP_PASV_IP.md CURLOPT_FTP_SSL_CCC.md CURLOPT_FTP_USE_EPRT.md CURLOPT_FTP_USE_EPSV.md CURLOPT_FTP_USE_PRET.md CURLOPT_GSSAPI_DELEGATION.md CURLOPT_HAPPY_EYEBALLS_TIMEOUT_MS.md CURLOPT_HAPROXYPROTOCOL.md CURLOPT_HAPROXY_CLIENT_IP.md CURLOPT_HEADER.md CURLOPT_HEADERDATA.md CURLOPT_HEADERFUNCTION.md CURLOPT_HEADEROPT.md CURLOPT_HSTS.md CURLOPT_HSTSREADDATA.md CURLOPT_HSTSREADFUNCTION.md CURLOPT_HSTSWRITEDATA.md CURLOPT_HSTSWRITEFUNCTION.md CURLOPT_HSTS_CTRL.md CURLOPT_HTTP09_ALLOWED.md CURLOPT_HTTP200ALIASES.md CURLOPT_HTTPAUTH.md CURLOPT_HTTPGET.md CURLOPT_HTTPHEADER.md CURLOPT_HTTPPOST.md CURLOPT_HTTPPROXYTUNNEL.md CURLOPT_HTTP_CONTENT_DECODING.md CURLOPT_HTTP_TRANSFER_DECODING.md CURLOPT_HTTP_VERSION.md CURLOPT_IGNORE_CONTENT_LENGTH.md CURLOPT_INFILESIZE.md CURLOPT_INFILESIZE_LARGE.md CURLOPT_INTERFACE.md CURLOPT_INTERLEAVEDATA.md CURLOPT_INTERLEAVEFUNCTION.md CURLOPT_IOCTLDATA.md CURLOPT_IOCTLFUNCTION.md CURLOPT_IPRESOLVE.md CURLOPT_ISSUERCERT.md CURLOPT_ISSUERCERT_BLOB.md CURLOPT_KEEP_SENDING_ON_ERROR.md CURLOPT_KEYPASSWD.md CURLOPT_KRBLEVEL.md CURLOPT_LOCALPORT.md CURLOPT_LOCALPORTRANGE.md CURLOPT_LOGIN_OPTIONS.md CURLOPT_LOW_SPEED_LIMIT.md CURLOPT_LOW_SPEED_TIME.md CURLOPT_MAIL_AUTH.md CURLOPT_MAIL_FROM.md CURLOPT_MAIL_RCPT.md CURLOPT_MAIL_RCPT_ALLOWFAILS.md CURLOPT_MAXAGE_CONN.md CURLOPT_MAXCONNECTS.md CURLOPT_MAXFILESIZE.md CURLOPT_MAXFILESIZE_LARGE.md CURLOPT_MAXLIFETIME_CONN.md CURLOPT_MAXREDIRS.md CURLOPT_MAX_RECV_SPEED_LARGE.md CURLOPT_MAX_SEND_SPEED_LARGE.md CURLOPT_MIMEPOST.md CURLOPT_MIME_OPTIONS.md CURLOPT_NETRC.md CURLOPT_NETRC_FILE.md CURLOPT_NEW_DIRECTORY_PERMS.md CURLOPT_NEW_FILE_PERMS.md CURLOPT_NOBODY.md CURLOPT_NOPROGRESS.md CURLOPT_NOPROXY.md CURLOPT_NOSIGNAL.md CURLOPT_OPENSOCKETDATA.md CURLOPT_OPENSOCKETFUNCTION.md CURLOPT_PASSWORD.md CURLOPT_PATH_AS_IS.md CURLOPT_PINNEDPUBLICKEY.md CURLOPT_PIPEWAIT.md CURLOPT_PORT.md CURLOPT_POST.md CURLOPT_POSTFIELDS.md CURLOPT_POSTFIELDSIZE.md CURLOPT_POSTFIELDSIZE_LARGE.md CURLOPT_POSTQUOTE.md CURLOPT_POSTREDIR.md CURLOPT_PREQUOTE.md CURLOPT_PREREQDATA.md CURLOPT_PREREQFUNCTION.md CURLOPT_PRE_PROXY.md CURLOPT_PRIVATE.md CURLOPT_PROGRESSDATA.md CURLOPT_PROGRESSFUNCTION.md CURLOPT_PROTOCOLS.md CURLOPT_PROTOCOLS_STR.md CURLOPT_PROXY.md CURLOPT_PROXYAUTH.md CURLOPT_PROXYHEADER.md CURLOPT_PROXYPASSWORD.md CURLOPT_PROXYPORT.md CURLOPT_PROXYTYPE.md CURLOPT_PROXYUSERNAME.md CURLOPT_PROXYUSERPWD.md CURLOPT_PROXY_CAINFO.md CURLOPT_PROXY_CAINFO_BLOB.md CURLOPT_PROXY_CAPATH.md CURLOPT_PROXY_CRLFILE.md CURLOPT_PROXY_ISSUERCERT.md CURLOPT_PROXY_ISSUERCERT_BLOB.md CURLOPT_PROXY_KEYPASSWD.md CURLOPT_PROXY_PINNEDPUBLICKEY.md CURLOPT_PROXY_SERVICE_NAME.md CURLOPT_PROXY_SSLCERT.md CURLOPT_PROXY_SSLCERTTYPE.md CURLOPT_PROXY_SSLCERT_BLOB.md CURLOPT_PROXY_SSLKEY.md CURLOPT_PROXY_SSLKEYTYPE.md CURLOPT_PROXY_SSLKEY_BLOB.md CURLOPT_PROXY_SSLVERSION.md CURLOPT_PROXY_SSL_CIPHER_LIST.md CURLOPT_PROXY_SSL_OPTIONS.md CURLOPT_PROXY_SSL_VERIFYHOST.md CURLOPT_PROXY_SSL_VERIFYPEER.md CURLOPT_PROXY_TLS13_CIPHERS.md CURLOPT_PROXY_TLSAUTH_PASSWORD.md CURLOPT_PROXY_TLSAUTH_TYPE.md CURLOPT_PROXY_TLSAUTH_USERNAME.md CURLOPT_PROXY_TRANSFER_MODE.md CURLOPT_PUT.md CURLOPT_QUICK_EXIT.md CURLOPT_QUOTE.md CURLOPT_RANDOM_FILE.md CURLOPT_RANGE.md CURLOPT_READDATA.md CURLOPT_READFUNCTION.md CURLOPT_REDIR_PROTOCOLS.md CURLOPT_REDIR_PROTOCOLS_STR.md CURLOPT_REFERER.md CURLOPT_REQUEST_TARGET.md CURLOPT_RESOLVE.md CURLOPT_RESOLVER_START_DATA.md CURLOPT_RESOLVER_START_FUNCTION.md CURLOPT_RESUME_FROM.md CURLOPT_RESUME_FROM_LARGE.md CURLOPT_RTSP_CLIENT_CSEQ.md CURLOPT_RTSP_REQUEST.md CURLOPT_RTSP_SERVER_CSEQ.md CURLOPT_RTSP_SESSION_ID.md CURLOPT_RTSP_STREAM_URI.md CURLOPT_RTSP_TRANSPORT.md CURLOPT_SASL_AUTHZID.md CURLOPT_SASL_IR.md CURLOPT_SEEKDATA.md CURLOPT_SEEKFUNCTION.md CURLOPT_SERVER_RESPONSE_TIMEOUT.md CURLOPT_SERVER_RESPONSE_TIMEOUT_MS.md CURLOPT_SERVICE_NAME.md CURLOPT_SHARE.md CURLOPT_SOCKOPTDATA.md CURLOPT_SOCKOPTFUNCTION.md CURLOPT_SOCKS5_AUTH.md CURLOPT_SOCKS5_GSSAPI_NEC.md CURLOPT_SOCKS5_GSSAPI_SERVICE.md CURLOPT_SSH_AUTH_TYPES.md CURLOPT_SSH_COMPRESSION.md CURLOPT_SSH_HOSTKEYDATA.md CURLOPT_SSH_HOSTKEYFUNCTION.md CURLOPT_SSH_HOST_PUBLIC_KEY_MD5.md CURLOPT_SSH_HOST_PUBLIC_KEY_SHA256.md CURLOPT_SSH_KEYDATA.md CURLOPT_SSH_KEYFUNCTION.md CURLOPT_SSH_KNOWNHOSTS.md CURLOPT_SSH_PRIVATE_KEYFILE.md CURLOPT_SSH_PUBLIC_KEYFILE.md CURLOPT_SSLCERT.md CURLOPT_SSLCERTTYPE.md CURLOPT_SSLCERT_BLOB.md CURLOPT_SSLENGINE.md CURLOPT_SSLENGINE_DEFAULT.md CURLOPT_SSLKEY.md CURLOPT_SSLKEYTYPE.md CURLOPT_SSLKEY_BLOB.md CURLOPT_SSLVERSION.md CURLOPT_SSL_CIPHER_LIST.md CURLOPT_SSL_CTX_DATA.md CURLOPT_SSL_CTX_FUNCTION.md CURLOPT_SSL_EC_CURVES.md CURLOPT_SSL_ENABLE_ALPN.md CURLOPT_SSL_ENABLE_NPN.md CURLOPT_SSL_FALSESTART.md CURLOPT_SSL_OPTIONS.md CURLOPT_SSL_SESSIONID_CACHE.md CURLOPT_SSL_SIGNATURE_ALGORITHMS.md CURLOPT_SSL_VERIFYHOST.md CURLOPT_SSL_VERIFYPEER.md CURLOPT_SSL_VERIFYSTATUS.md CURLOPT_STDERR.md CURLOPT_STREAM_DEPENDS.md CURLOPT_STREAM_DEPENDS_E.md CURLOPT_STREAM_WEIGHT.md CURLOPT_SUPPRESS_CONNECT_HEADERS.md CURLOPT_TCP_FASTOPEN.md CURLOPT_TCP_KEEPALIVE.md CURLOPT_TCP_KEEPCNT.md CURLOPT_TCP_KEEPIDLE.md CURLOPT_TCP_KEEPINTVL.md CURLOPT_TCP_NODELAY.md CURLOPT_TELNETOPTIONS.md CURLOPT_TFTP_BLKSIZE.md CURLOPT_TFTP_NO_OPTIONS.md CURLOPT_TIMECONDITION.md CURLOPT_TIMEOUT.md CURLOPT_TIMEOUT_MS.md CURLOPT_TIMEVALUE.md CURLOPT_TIMEVALUE_LARGE.md CURLOPT_TLS13_CIPHERS.md CURLOPT_TLSAUTH_PASSWORD.md CURLOPT_TLSAUTH_TYPE.md CURLOPT_TLSAUTH_USERNAME.md CURLOPT_TRAILERDATA.md CURLOPT_TRAILERFUNCTION.md CURLOPT_TRANSFERTEXT.md CURLOPT_TRANSFER_ENCODING.md CURLOPT_UNIX_SOCKET_PATH.md CURLOPT_UNRESTRICTED_AUTH.md CURLOPT_UPKEEP_INTERVAL_MS.md CURLOPT_UPLOAD.md CURLOPT_UPLOAD_BUFFERSIZE.md CURLOPT_UPLOAD_FLAGS.md CURLOPT_URL.md CURLOPT_USERAGENT.md CURLOPT_USERNAME.md CURLOPT_USERPWD.md CURLOPT_USE_SSL.md CURLOPT_VERBOSE.md CURLOPT_WILDCARDMATCH.md CURLOPT_WRITEDATA.md CURLOPT_WRITEFUNCTION.md CURLOPT_WS_OPTIONS.md CURLOPT_XFERINFODATA.md CURLOPT_XFERINFOFUNCTION.md CURLOPT_XOAUTH2_BEARER.md CURLSHOPT_LOCKFUNC.md CURLSHOPT_SHARE.md CURLSHOPT_UNLOCKFUNC.md CURLSHOPT_UNSHARE.md CURLSHOPT_USERDATA.md Makefile.am Makefile.incinclude
curl
Makefile.am curl.h curlver.h easy.h header.h mprintf.h multi.h options.h stdcheaders.h system.h typecheck-gcc.h urlapi.h websockets.hlib
curlx
base64.c base64.h basename.c basename.h dynbuf.c dynbuf.h fopen.c fopen.h inet_ntop.c inet_ntop.h inet_pton.c inet_pton.h multibyte.c multibyte.h nonblock.c nonblock.h snprintf.c snprintf.h strcopy.c strcopy.h strdup.c strdup.h strerr.c strerr.h strparse.c strparse.h timediff.c timediff.h timeval.c timeval.h version_win32.c version_win32.h wait.c wait.h warnless.c warnless.h winapi.c winapi.hvauth
cleartext.c cram.c digest.c digest.h digest_sspi.c gsasl.c krb5_gssapi.c krb5_sspi.c ntlm.c ntlm_sspi.c oauth2.c spnego_gssapi.c spnego_sspi.c vauth.c vauth.hvquic
curl_ngtcp2.c curl_ngtcp2.h curl_quiche.c curl_quiche.h vquic-tls.c vquic-tls.h vquic.c vquic.h vquic_int.hvtls
apple.c apple.h cipher_suite.c cipher_suite.h gtls.c gtls.h hostcheck.c hostcheck.h keylog.c keylog.h mbedtls.c mbedtls.h openssl.c openssl.h rustls.c rustls.h schannel.c schannel.h schannel_int.h schannel_verify.c vtls.c vtls.h vtls_int.h vtls_scache.c vtls_scache.h vtls_spack.c vtls_spack.h wolfssl.c wolfssl.h x509asn1.c x509asn1.hm4
.gitignore curl-amissl.m4 curl-apple-sectrust.m4 curl-compilers.m4 curl-confopts.m4 curl-functions.m4 curl-gnutls.m4 curl-mbedtls.m4 curl-openssl.m4 curl-override.m4 curl-reentrant.m4 curl-rustls.m4 curl-schannel.m4 curl-sysconfig.m4 curl-wolfssl.m4 xc-am-iface.m4 xc-cc-check.m4 xc-lt-iface.m4 xc-val-flgs.m4 zz40-xc-ovr.m4 zz50-xc-ovr.m4projects
OS400
.checksrc README.OS400 ccsidcurl.c ccsidcurl.h config400.default curl.cmd curl.inc.in curlcl.c curlmain.c initscript.sh make-docs.sh make-include.sh make-lib.sh make-src.sh make-tests.sh makefile.sh os400sys.c os400sys.hWindows
tmpl
.gitattributes README.txt curl-all.sln curl.sln curl.vcxproj curl.vcxproj.filters libcurl.sln libcurl.vcxproj libcurl.vcxproj.filtersvms
Makefile.am backup_gnv_curl_src.com build_curl-config_script.com build_gnv_curl.com build_gnv_curl_pcsi_desc.com build_gnv_curl_pcsi_text.com build_gnv_curl_release_notes.com build_libcurl_pc.com build_vms.com clean_gnv_curl.com compare_curl_source.com config_h.com curl_crtl_init.c curl_gnv_build_steps.txt curl_release_note_start.txt curl_startup.com curlmsg.h curlmsg.msg curlmsg.sdl curlmsg_vms.h generate_config_vms_h_curl.com generate_vax_transfer.com gnv_conftest.c_first gnv_curl_configure.sh gnv_libcurl_symbols.opt gnv_link_curl.com macro32_exactcase.patch make_gnv_curl_install.sh make_pcsi_curl_kit_name.com pcsi_gnv_curl_file_list.txt pcsi_product_gnv_curl.com readme report_openssl_version.c setup_gnv_curl_build.com stage_curl_install.com vms_eco_level.hscripts
.checksrc CMakeLists.txt Makefile.am badwords badwords-all badwords.txt cd2cd cd2nroff cdall checksrc-all.pl checksrc.pl cmakelint.sh completion.pl contributors.sh contrithanks.sh coverage.sh delta dmaketgz extract-unit-protos firefox-db2pem.sh installcheck.sh maketgz managen mdlinkcheck mk-ca-bundle.pl mk-unity.pl nroff2cd perlcheck.sh pythonlint.sh randdisable release-notes.pl release-tools.sh schemetable.c singleuse.pl spacecheck.pl top-complexity top-length verify-release wcurlsrc
.checksrc .gitignore CMakeLists.txt Makefile.am Makefile.inc config2setopts.c config2setopts.h curl.rc curlinfo.c mk-file-embed.pl mkhelp.pl slist_wc.c slist_wc.h terminal.c terminal.h tool_cb_dbg.c tool_cb_dbg.h tool_cb_hdr.c tool_cb_hdr.h tool_cb_prg.c tool_cb_prg.h tool_cb_rea.c tool_cb_rea.h tool_cb_see.c tool_cb_see.h tool_cb_soc.c tool_cb_soc.h tool_cb_wrt.c tool_cb_wrt.h tool_cfgable.c tool_cfgable.h tool_dirhie.c tool_dirhie.h tool_doswin.c tool_doswin.h tool_easysrc.c tool_easysrc.h tool_filetime.c tool_filetime.h tool_findfile.c tool_findfile.h tool_formparse.c tool_formparse.h tool_getparam.c tool_getparam.h tool_getpass.c tool_getpass.h tool_help.c tool_help.h tool_helpers.c tool_helpers.h tool_hugehelp.h tool_ipfs.c tool_ipfs.h tool_libinfo.c tool_libinfo.h tool_listhelp.c tool_main.c tool_main.h tool_msgs.c tool_msgs.h tool_operate.c tool_operate.h tool_operhlp.c tool_operhlp.h tool_paramhlp.c tool_paramhlp.h tool_parsecfg.c tool_parsecfg.h tool_progress.c tool_progress.h tool_sdecls.h tool_setopt.c tool_setopt.h tool_setup.h tool_ssls.c tool_ssls.h tool_stderr.c tool_stderr.h tool_urlglob.c tool_urlglob.h tool_util.c tool_util.h tool_version.h tool_vms.c tool_vms.h tool_writeout.c tool_writeout.h tool_writeout_json.c tool_writeout_json.h tool_xattr.c tool_xattr.h var.c var.htests
certs
.gitignore CMakeLists.txt Makefile.am Makefile.inc genserv.pl srp-verifier-conf srp-verifier-db test-ca.cnf test-ca.prm test-client-cert.prm test-client-eku-only.prm test-localhost-san-first.prm test-localhost-san-last.prm test-localhost.nn.prm test-localhost.prm test-localhost0h.prmdata
.gitignore DISABLED Makefile.am data-xml1 data1400.c data1401.c data1402.c data1403.c data1404.c data1405.c data1406.c data1407.c data1420.c data1461.txt data1463.txt data1465.c data1481.c data1705-1.md data1705-2.md data1705-3.md data1705-4.md data1705-stdout.1 data1706-1.md data1706-2.md data1706-3.md data1706-4.md data1706-stdout.txt data320.html test1 test10 test100 test1000 test1001 test1002 test1003 test1004 test1005 test1006 test1007 test1008 test1009 test101 test1010 test1011 test1012 test1013 test1014 test1015 test1016 test1017 test1018 test1019 test102 test1020 test1021 test1022 test1023 test1024 test1025 test1026 test1027 test1028 test1029 test103 test1030 test1031 test1032 test1033 test1034 test1035 test1036 test1037 test1038 test1039 test104 test1040 test1041 test1042 test1043 test1044 test1045 test1046 test1047 test1048 test1049 test105 test1050 test1051 test1052 test1053 test1054 test1055 test1056 test1057 test1058 test1059 test106 test1060 test1061 test1062 test1063 test1064 test1065 test1066 test1067 test1068 test1069 test107 test1070 test1071 test1072 test1073 test1074 test1075 test1076 test1077 test1078 test1079 test108 test1080 test1081 test1082 test1083 test1084 test1085 test1086 test1087 test1088 test1089 test109 test1090 test1091 test1092 test1093 test1094 test1095 test1096 test1097 test1098 test1099 test11 test110 test1100 test1101 test1102 test1103 test1104 test1105 test1106 test1107 test1108 test1109 test111 test1110 test1111 test1112 test1113 test1114 test1115 test1116 test1117 test1118 test1119 test112 test1120 test1121 test1122 test1123 test1124 test1125 test1126 test1127 test1128 test1129 test113 test1130 test1131 test1132 test1133 test1134 test1135 test1136 test1137 test1138 test1139 test114 test1140 test1141 test1142 test1143 test1144 test1145 test1146 test1147 test1148 test1149 test115 test1150 test1151 test1152 test1153 test1154 test1155 test1156 test1157 test1158 test1159 test116 test1160 test1161 test1162 test1163 test1164 test1165 test1166 test1167 test1168 test1169 test117 test1170 test1171 test1172 test1173 test1174 test1175 test1176 test1177 test1178 test1179 test118 test1180 test1181 test1182 test1183 test1184 test1185 test1186 test1187 test1188 test1189 test119 test1190 test1191 test1192 test1193 test1194 test1195 test1196 test1197 test1198 test1199 test12 test120 test1200 test1201 test1202 test1203 test1204 test1205 test1206 test1207 test1208 test1209 test121 test1210 test1211 test1212 test1213 test1214 test1215 test1216 test1217 test1218 test1219 test122 test1220 test1221 test1222 test1223 test1224 test1225 test1226 test1227 test1228 test1229 test123 test1230 test1231 test1232 test1233 test1234 test1235 test1236 test1237 test1238 test1239 test124 test1240 test1241 test1242 test1243 test1244 test1245 test1246 test1247 test1248 test1249 test125 test1250 test1251 test1252 test1253 test1254 test1255 test1256 test1257 test1258 test1259 test126 test1260 test1261 test1262 test1263 test1264 test1265 test1266 test1267 test1268 test1269 test127 test1270 test1271 test1272 test1273 test1274 test1275 test1276 test1277 test1278 test1279 test128 test1280 test1281 test1282 test1283 test1284 test1285 test1286 test1287 test1288 test1289 test129 test1290 test1291 test1292 test1293 test1294 test1295 test1296 test1297 test1298 test1299 test13 test130 test1300 test1301 test1302 test1303 test1304 test1305 test1306 test1307 test1308 test1309 test131 test1310 test1311 test1312 test1313 test1314 test1315 test1316 test1317 test1318 test1319 test132 test1320 test1321 test1322 test1323 test1324 test1325 test1326 test1327 test1328 test1329 test133 test1330 test1331 test1332 test1333 test1334 test1335 test1336 test1337 test1338 test1339 test134 test1340 test1341 test1342 test1343 test1344 test1345 test1346 test1347 test1348 test1349 test135 test1350 test1351 test1352 test1353 test1354 test1355 test1356 test1357 test1358 test1359 test136 test1360 test1361 test1362 test1363 test1364 test1365 test1366 test1367 test1368 test1369 test137 test1370 test1371 test1372 test1373 test1374 test1375 test1376 test1377 test1378 test1379 test138 test1380 test1381 test1382 test1383 test1384 test1385 test1386 test1387 test1388 test1389 test139 test1390 test1391 test1392 test1393 test1394 test1395 test1396 test1397 test1398 test1399 test14 test140 test1400 test1401 test1402 test1403 test1404 test1405 test1406 test1407 test1408 test1409 test141 test1410 test1411 test1412 test1413 test1414 test1415 test1416 test1417 test1418 test1419 test142 test1420 test1421 test1422 test1423 test1424 test1425 test1426 test1427 test1428 test1429 test143 test1430 test1431 test1432 test1433 test1434 test1435 test1436 test1437 test1438 test1439 test144 test1440 test1441 test1442 test1443 test1444 test1445 test1446 test1447 test1448 test1449 test145 test1450 test1451 test1452 test1453 test1454 test1455 test1456 test1457 test1458 test1459 test146 test1460 test1461 test1462 test1463 test1464 test1465 test1466 test1467 test1468 test1469 test147 test1470 test1471 test1472 test1473 test1474 test1475 test1476 test1477 test1478 test1479 test148 test1480 test1481 test1482 test1483 test1484 test1485 test1486 test1487 test1488 test1489 test149 test1490 test1491 test1492 test1493 test1494 test1495 test1496 test1497 test1498 test1499 test15 test150 test1500 test1501 test1502 test1503 test1504 test1505 test1506 test1507 test1508 test1509 test151 test1510 test1511 test1512 test1513 test1514 test1515 test1516 test1517 test1518 test1519 test152 test1520 test1521 test1522 test1523 test1524 test1525 test1526 test1527 test1528 test1529 test153 test1530 test1531 test1532 test1533 test1534 test1535 test1536 test1537 test1538 test1539 test154 test1540 test1541 test1542 test1543 test1544 test1545 test1546 test1547 test1548 test1549 test155 test1550 test1551 test1552 test1553 test1554 test1555 test1556 test1557 test1558 test1559 test156 test1560 test1561 test1562 test1563 test1564 test1565 test1566 test1567 test1568 test1569 test157 test1570 test1571 test1572 test1573 test1574 test1575 test1576 test1577 test1578 test1579 test158 test1580 test1581 test1582 test1583 test1584 test1585 test1586 test1587 test1588 test1589 test159 test1590 test1591 test1592 test1593 test1594 test1595 test1596 test1597 test1598 test1599 test16 test160 test1600 test1601 test1602 test1603 test1604 test1605 test1606 test1607 test1608 test1609 test161 test1610 test1611 test1612 test1613 test1614 test1615 test1616 test1617 test1618 test1619 test162 test1620 test1621 test1622 test1623 test1624 test1625 test1626 test1627 test1628 test1629 test163 test1630 test1631 test1632 test1633 test1634 test1635 test1636 test1637 test1638 test1639 test164 test1640 test1641 test1642 test1643 test1644 test1645 test165 test1650 test1651 test1652 test1653 test1654 test1655 test1656 test1657 test1658 test1659 test166 test1660 test1661 test1662 test1663 test1664 test1665 test1666 test1667 test1668 test1669 test167 test1670 test1671 test1672 test1673 test1674 test1675 test1676 test168 test1680 test1681 test1682 test1683 test1684 test1685 test169 test17 test170 test1700 test1701 test1702 test1703 test1704 test1705 test1706 test1707 test1708 test1709 test171 test1710 test1711 test1712 test1713 test1714 test1715 test172 test1720 test1721 test173 test174 test175 test176 test177 test178 test179 test18 test180 test1800 test1801 test1802 test181 test182 test183 test184 test1847 test1848 test1849 test185 test1850 test1851 test186 test187 test188 test189 test19 test190 test1900 test1901 test1902 test1903 test1904 test1905 test1906 test1907 test1908 test1909 test191 test1910 test1911 test1912 test1913 test1914 test1915 test1916 test1917 test1918 test1919 test192 test1920 test1921 test193 test1933 test1934 test1935 test1936 test1937 test1938 test1939 test194 test1940 test1941 test1942 test1943 test1944 test1945 test1946 test1947 test1948 test195 test1955 test1956 test1957 test1958 test1959 test196 test1960 test1964 test1965 test1966 test197 test1970 test1971 test1972 test1973 test1974 test1975 test1976 test1977 test1978 test1979 test198 test1980 test1981 test1982 test1983 test1984 test199 test2 test20 test200 test2000 test2001 test2002 test2003 test2004 test2005 test2006 test2007 test2008 test2009 test201 test2010 test2011 test2012 test2013 test2014 test202 test2023 test2024 test2025 test2026 test2027 test2028 test2029 test203 test2030 test2031 test2032 test2033 test2034 test2035 test2037 test2038 test2039 test204 test2040 test2041 test2042 test2043 test2044 test2045 test2046 test2047 test2048 test2049 test205 test2050 test2051 test2052 test2053 test2054 test2055 test2056 test2057 test2058 test2059 test206 test2060 test2061 test2062 test2063 test2064 test2065 test2066 test2067 test2068 test2069 test207 test2070 test2071 test2072 test2073 test2074 test2075 test2076 test2077 test2078 test2079 test208 test2080 test2081 test2082 test2083 test2084 test2085 test2086 test2087 test2088 test2089 test209 test2090 test2091 test2092 test21 test210 test2100 test2101 test2102 test2103 test2104 test211 test212 test213 test214 test215 test216 test217 test218 test219 test22 test220 test2200 test2201 test2202 test2203 test2204 test2205 test2206 test2207 test221 test222 test223 test224 test225 test226 test227 test228 test229 test23 test230 test2300 test2301 test2302 test2303 test2304 test2306 test2307 test2308 test2309 test231 test232 test233 test234 test235 test236 test237 test238 test239 test24 test240 test2400 test2401 test2402 test2403 test2404 test2405 test2406 test2407 test2408 test2409 test241 test2410 test2411 test242 test243 test244 test245 test246 test247 test248 test249 test25 test250 test2500 test2501 test2502 test2503 test2504 test2505 test2506 test251 test252 test253 test254 test255 test256 test257 test258 test259 test26 test260 test2600 test2601 test2602 test2603 test2604 test2605 test261 test262 test263 test264 test265 test266 test267 test268 test269 test27 test270 test2700 test2701 test2702 test2703 test2704 test2705 test2706 test2707 test2708 test2709 test271 test2710 test2711 test2712 test2713 test2714 test2715 test2716 test2717 test2718 test2719 test272 test2720 test2721 test2722 test2723 test273 test274 test275 test276 test277 test278 test279 test28 test280 test281 test282 test283 test284 test285 test286 test287 test288 test289 test29 test290 test291 test292 test293 test294 test295 test296 test297 test298 test299 test3 test30 test300 test3000 test3001 test3002 test3003 test3004 test3005 test3006 test3007 test3008 test3009 test301 test3010 test3011 test3012 test3013 test3014 test3015 test3016 test3017 test3018 test3019 test302 test3020 test3021 test3022 test3023 test3024 test3025 test3026 test3027 test3028 test3029 test303 test3030 test3031 test3032 test3033 test3034 test3035 test3036 test304 test305 test306 test307 test308 test309 test31 test310 test3100 test3101 test3102 test3103 test3104 test3105 test3106 test311 test312 test313 test314 test315 test316 test317 test318 test319 test32 test320 test3200 test3201 test3202 test3203 test3204 test3205 test3206 test3207 test3208 test3209 test321 test3210 test3211 test3212 test3213 test3214 test3215 test3216 test3217 test3218 test3219 test322 test3220 test323 test324 test325 test326 test327 test328 test329 test33 test330 test3300 test3301 test3302 test331 test332 test333 test334 test335 test336 test337 test338 test339 test34 test340 test341 test342 test343 test344 test345 test346 test347 test348 test349 test35 test350 test351 test352 test353 test354 test355 test356 test357 test358 test359 test36 test360 test361 test362 test363 test364 test365 test366 test367 test368 test369 test37 test370 test371 test372 test373 test374 test375 test376 test378 test379 test38 test380 test381 test383 test384 test385 test386 test387 test388 test389 test39 test390 test391 test392 test393 test394 test395 test396 test397 test398 test399 test4 test40 test400 test4000 test4001 test401 test402 test403 test404 test405 test406 test407 test408 test409 test41 test410 test411 test412 test413 test414 test415 test416 test417 test418 test419 test42 test420 test421 test422 test423 test424 test425 test426 test427 test428 test429 test43 test430 test431 test432 test433 test434 test435 test436 test437 test438 test439 test44 test440 test441 test442 test443 test444 test445 test446 test447 test448 test449 test45 test450 test451 test452 test453 test454 test455 test456 test457 test458 test459 test46 test460 test461 test462 test463 test467 test468 test469 test47 test470 test471 test472 test473 test474 test475 test476 test477 test478 test479 test48 test480 test481 test482 test483 test484 test485 test486 test487 test488 test489 test49 test490 test491 test492 test493 test494 test495 test496 test497 test498 test499 test5 test50 test500 test501 test502 test503 test504 test505 test506 test507 test508 test509 test51 test510 test511 test512 test513 test514 test515 test516 test517 test518 test519 test52 test520 test521 test522 test523 test524 test525 test526 test527 test528 test529 test53 test530 test531 test532 test533 test534 test535 test536 test537 test538 test539 test54 test540 test541 test542 test543 test544 test545 test546 test547 test548 test549 test55 test550 test551 test552 test553 test554 test555 test556 test557 test558 test559 test56 test560 test561 test562 test563 test564 test565 test566 test567 test568 test569 test57 test570 test571 test572 test573 test574 test575 test576 test577 test578 test579 test58 test580 test581 test582 test583 test584 test585 test586 test587 test588 test589 test59 test590 test591 test592 test593 test594 test595 test596 test597 test598 test599 test6 test60 test600 test601 test602 test603 test604 test605 test606 test607 test608 test609 test61 test610 test611 test612 test613 test614 test615 test616 test617 test618 test619 test62 test620 test621 test622 test623 test624 test625 test626 test627 test628 test629 test63 test630 test631 test632 test633 test634 test635 test636 test637 test638 test639 test64 test640 test641 test642 test643 test644 test645 test646 test647 test648 test649 test65 test650 test651 test652 test653 test654 test655 test656 test658 test659 test66 test660 test661 test662 test663 test664 test665 test666 test667 test668 test669 test67 test670 test671 test672 test673 test674 test675 test676 test677 test678 test679 test68 test680 test681 test682 test683 test684 test685 test686 test687 test688 test689 test69 test690 test691 test692 test693 test694 test695 test696 test697 test698 test699 test7 test70 test700 test701 test702 test703 test704 test705 test706 test707 test708 test709 test71 test710 test711 test712 test713 test714 test715 test716 test717 test718 test719 test72 test720 test721 test722 test723 test724 test725 test726 test727 test728 test729 test73 test730 test731 test732 test733 test734 test735 test736 test737 test738 test739 test74 test740 test741 test742 test743 test744 test745 test746 test747 test748 test749 test75 test750 test751 test752 test753 test754 test755 test756 test757 test758 test759 test76 test760 test761 test762 test763 test764 test765 test766 test767 test768 test769 test77 test770 test771 test772 test773 test774 test775 test776 test777 test778 test779 test78 test780 test781 test782 test783 test784 test785 test786 test787 test788 test789 test79 test790 test791 test792 test793 test794 test795 test796 test797 test798 test799 test8 test80 test800 test801 test802 test803 test804 test805 test806 test807 test808 test809 test81 test810 test811 test812 test813 test814 test815 test816 test817 test818 test819 test82 test820 test821 test822 test823 test824 test825 test826 test827 test828 test829 test83 test830 test831 test832 test833 test834 test835 test836 test837 test838 test839 test84 test840 test841 test842 test843 test844 test845 test846 test847 test848 test849 test85 test850 test851 test852 test853 test854 test855 test856 test857 test858 test859 test86 test860 test861 test862 test863 test864 test865 test866 test867 test868 test869 test87 test870 test871 test872 test873 test874 test875 test876 test877 test878 test879 test88 test880 test881 test882 test883 test884 test885 test886 test887 test888 test889 test89 test890 test891 test892 test893 test894 test895 test896 test897 test898 test899 test9 test90 test900 test901 test902 test903 test904 test905 test906 test907 test908 test909 test91 test910 test911 test912 test913 test914 test915 test916 test917 test918 test919 test92 test920 test921 test922 test923 test924 test925 test926 test927 test928 test929 test93 test930 test931 test932 test933 test934 test935 test936 test937 test938 test939 test94 test940 test941 test942 test943 test944 test945 test946 test947 test948 test949 test95 test950 test951 test952 test953 test954 test955 test956 test957 test958 test959 test96 test960 test961 test962 test963 test964 test965 test966 test967 test968 test969 test97 test970 test971 test972 test973 test974 test975 test976 test977 test978 test979 test98 test980 test981 test982 test983 test984 test985 test986 test987 test988 test989 test99 test990 test991 test992 test993 test994 test995 test996 test997 test998 test999http
testenv
__init__.py caddy.py certs.py client.py curl.py dante.py dnsd.py env.py httpd.py nghttpx.py ports.py sshd.py vsftpd.py ws_echo_server.pylibtest
.gitignore CMakeLists.txt Makefile.am Makefile.inc cli_ftp_upload.c cli_h2_pausing.c cli_h2_serverpush.c cli_h2_upgrade_extreme.c cli_hx_download.c cli_hx_upload.c cli_tls_session_reuse.c cli_upload_pausing.c cli_ws_data.c cli_ws_pingpong.c first.c first.h lib1156.c lib1301.c lib1308.c lib1485.c lib1500.c lib1501.c lib1502.c lib1506.c lib1507.c lib1508.c lib1509.c lib1510.c lib1511.c lib1512.c lib1513.c lib1514.c lib1515.c lib1517.c lib1518.c lib1520.c lib1522.c lib1523.c lib1525.c lib1526.c lib1527.c lib1528.c lib1529.c lib1530.c lib1531.c lib1532.c lib1533.c lib1534.c lib1535.c lib1536.c lib1537.c lib1538.c lib1540.c lib1541.c lib1542.c lib1545.c lib1549.c lib1550.c lib1551.c lib1552.c lib1553.c lib1554.c lib1555.c lib1556.c lib1557.c lib1558.c lib1559.c lib1560.c lib1564.c lib1565.c lib1567.c lib1568.c lib1569.c lib1571.c lib1576.c lib1582.c lib1587.c lib1588.c lib1589.c lib1591.c lib1592.c lib1593.c lib1594.c lib1597.c lib1598.c lib1599.c lib1662.c lib1900.c lib1901.c lib1902.c lib1903.c lib1905.c lib1906.c lib1907.c lib1908.c lib1910.c lib1911.c lib1912.c lib1913.c lib1915.c lib1916.c lib1918.c lib1919.c lib1920.c lib1921.c lib1933.c lib1934.c lib1935.c lib1936.c lib1937.c lib1938.c lib1939.c lib1940.c lib1945.c lib1947.c lib1948.c lib1955.c lib1956.c lib1957.c lib1958.c lib1959.c lib1960.c lib1964.c lib1965.c lib1970.c lib1971.c lib1972.c lib1973.c lib1974.c lib1975.c lib1977.c lib1978.c lib2023.c lib2032.c lib2082.c lib2301.c lib2302.c lib2304.c lib2306.c lib2308.c lib2309.c lib2402.c lib2404.c lib2405.c lib2502.c lib2504.c lib2505.c lib2506.c lib2700.c lib3010.c lib3025.c lib3026.c lib3027.c lib3033.c lib3034.c lib3100.c lib3101.c lib3102.c lib3103.c lib3104.c lib3105.c lib3207.c lib3208.c lib500.c lib501.c lib502.c lib503.c lib504.c lib505.c lib506.c lib507.c lib508.c lib509.c lib510.c lib511.c lib512.c lib513.c lib514.c lib515.c lib516.c lib517.c lib518.c lib519.c lib520.c lib521.c lib523.c lib524.c lib525.c lib526.c lib530.c lib533.c lib536.c lib537.c lib539.c lib540.c lib541.c lib542.c lib543.c lib544.c lib547.c lib549.c lib552.c lib553.c lib554.c lib555.c lib556.c lib557.c lib558.c lib559.c lib560.c lib562.c lib564.c lib566.c lib567.c lib568.c lib569.c lib570.c lib571.c lib572.c lib573.c lib574.c lib575.c lib576.c lib578.c lib579.c lib582.c lib583.c lib586.c lib589.c lib590.c lib591.c lib597.c lib598.c lib599.c lib643.c lib650.c lib651.c lib652.c lib653.c lib654.c lib655.c lib658.c lib659.c lib661.c lib666.c lib667.c lib668.c lib670.c lib674.c lib676.c lib677.c lib678.c lib694.c lib695.c lib751.c lib753.c lib757.c lib758.c lib766.c memptr.c mk-lib1521.pl test1013.pl test1022.pl test307.pl test610.pl test613.pl testtrace.c testtrace.h testutil.c testutil.h unitcheck.hserver
.checksrc .gitignore CMakeLists.txt Makefile.am Makefile.inc dnsd.c first.c first.h getpart.c mqttd.c resolve.c rtspd.c sockfilt.c socksd.c sws.c tftpd.c util.ctunit
.gitignore CMakeLists.txt Makefile.am Makefile.inc README.md tool1394.c tool1604.c tool1621.c tool1622.c tool1623.c tool1720.cunit
.gitignore CMakeLists.txt Makefile.am Makefile.inc README.md unit1300.c unit1302.c unit1303.c unit1304.c unit1305.c unit1307.c unit1309.c unit1323.c unit1330.c unit1395.c unit1396.c unit1397.c unit1398.c unit1399.c unit1600.c unit1601.c unit1602.c unit1603.c unit1605.c unit1606.c unit1607.c unit1608.c unit1609.c unit1610.c unit1611.c unit1612.c unit1614.c unit1615.c unit1616.c unit1620.c unit1625.c unit1626.c unit1627.c unit1636.c unit1650.c unit1651.c unit1652.c unit1653.c unit1654.c unit1655.c unit1656.c unit1657.c unit1658.c unit1660.c unit1661.c unit1663.c unit1664.c unit1666.c unit1667.c unit1668.c unit1669.c unit1674.c unit1675.c unit1676.c unit1979.c unit1980.c unit2600.c unit2601.c unit2602.c unit2603.c unit2604.c unit2605.c unit3200.c unit3205.c unit3211.c unit3212.c unit3213.c unit3214.c unit3216.c unit3219.c unit3300.c unit3301.c unit3302.cexamples
.env config.ini crypto_test.lua env_test.lua fs_example.lua http_server.lua https_test.lua ini_example.lua json.lua log.lua path_fs_example.lua process_example.lua request_download.lua request_test.lua run_all.lua sqlite_example.lua sqlite_http_template.lua stash_test.lua template_test.lua timer.lua websocket.luainiparser
example
iniexample.c iniwrite.c parse.c twisted-errors.ini twisted-genhuge.py twisted-ofkey.ini twisted-ofval.ini twisted.initest
CMakeLists.txt test_dictionary.c test_iniparser.c unity-config.yml unity_config.hjinjac
libjinjac
src
CMakeLists.txt ast.c ast.h block_statement.c block_statement.h buffer.c buffer.h buildin.c buildin.h common.h convert.c convert.h flex_decl.h jfunction.c jfunction.h jinja_expression.l jinja_expression.y jinjac_parse.c jinjac_parse.h jinjac_stream.c jinjac_stream.h jlist.c jlist.h jobject.c jobject.h parameter.c parameter.h str_obj.c str_obj.h trace.c trace.htest
.gitignore CMakeLists.txt autotest.rb test_01.expected test_01.jinja test_01b.expected test_01b.jinja test_01c.expected test_01c.jinja test_01d.expected test_01d.jinja test_02.expected test_02.jinja test_03.expected test_03.jinja test_04.expected test_04.jinja test_05.expected test_05.jinja test_06.expected test_06.jinja test_07.expected test_07.jinja test_08.expected test_08.jinja test_08b.expected test_08b.jinja test_09.expected test_09.jinja test_10.expected test_10.jinja test_11.expected test_11.jinja test_12.expected test_12.jinja test_13.expected test_13.jinja test_14.expected test_14.jinja test_15.expected test_15.jinja test_16.expected test_16.jinja test_17.expected test_17.jinja test_18.expected test_18.jinja test_18b.expected test_18b.jinja test_18c.expected test_18c.jinja test_19.expected test_19.jinja test_19b.expected test_19b.jinja test_19c.expected test_19c.jinja test_19d.expected test_19d.jinja test_19e.expected test_19e.jinja test_19f.expected test_19f.jinja test_20.expected test_20.jinja test_21.expected test_21.jinja test_22.expected test_22.jinja test_22a.expected test_22a.jinja test_22b.expected test_22b.jinja test_23.expected test_23.jinja test_24.expected test_24.jinjalibev
Changes LICENSE Makefile Makefile.am Makefile.in README Symbols.ev Symbols.event aclocal.m4 autogen.sh compile config.guess config.h config.h.in config.status config.sub configure configure.ac depcomp ev++.h ev.3 ev.c ev.h ev.pod ev_epoll.c ev_kqueue.c ev_poll.c ev_port.c ev_select.c ev_vars.h ev_win32.c ev_wrap.h event.c event.h install-sh libev.m4 libtool ltmain.sh missing mkinstalldirs stamp-h1luajit
doc
bluequad-print.css bluequad.css contact.html ext_buffer.html ext_c_api.html ext_ffi.html ext_ffi_api.html ext_ffi_semantics.html ext_ffi_tutorial.html ext_jit.html ext_profiler.html extensions.html install.html luajit.html running.htmldynasm
dasm_arm.h dasm_arm.lua dasm_arm64.h dasm_arm64.lua dasm_mips.h dasm_mips.lua dasm_mips64.lua dasm_ppc.h dasm_ppc.lua dasm_proto.h dasm_x64.lua dasm_x86.h dasm_x86.lua dynasm.luasrc
host
.gitignore README buildvm.c buildvm.h buildvm_asm.c buildvm_fold.c buildvm_lib.c buildvm_libbc.h buildvm_peobj.c genlibbc.lua genminilua.lua genversion.lua minilua.cjit
.gitignore bc.lua bcsave.lua dis_arm.lua dis_arm64.lua dis_arm64be.lua dis_mips.lua dis_mips64.lua dis_mips64el.lua dis_mips64r6.lua dis_mips64r6el.lua dis_mipsel.lua dis_ppc.lua dis_x64.lua dis_x86.lua dump.lua p.lua v.lua zone.luawolfssl
.github
workflows
ada.yml arduino.yml async-examples.yml async.yml atecc608-sim.yml bind.yml cmake-autoconf.yml cmake.yml codespell.yml coverity-scan-fixes.yml cryptocb-only.yml curl.yml cyrus-sasl.yml disable-pk-algs.yml docker-Espressif.yml docker-OpenWrt.yml emnet-nonblock.yml fil-c.yml freertos-mem-track.yml gencertbuf.yml grpc.yml haproxy.yml hostap-vm.yml intelasm-c-fallback.yml ipmitool.yml jwt-cpp.yml krb5.yml libspdm.yml libssh2.yml libvncserver.yml linuxkm.yml macos-apple-native-cert-validation.yml mbedtls.sh mbedtls.yml membrowse-comment.yml membrowse-onboard.yml membrowse-report.yml memcached.sh memcached.yml mono.yml mosquitto.yml msmtp.yml msys2.yml multi-arch.yml multi-compiler.yml net-snmp.yml nginx.yml no-malloc.yml no-tls.yml nss.sh nss.yml ntp.yml ocsp.yml openldap.yml openssh.yml openssl-ech.yml opensslcoexist.yml openvpn.yml os-check.yml packaging.yml pam-ipmi.yml pq-all.yml pr-commit-check.yml psk.yml puf.yml python.yml rng-tools.yml rust-wrapper.yml se050-sim.yml smallStackSize.yml socat.yml softhsm.yml sssd.yml stm32-sim.yml stsafe-a120-sim.yml stunnel.yml symbol-prefixes.yml threadx.yml tls-anvil.yml trackmemory.yml watcomc.yml win-csharp-test.yml wolfCrypt-Wconversion.yml wolfboot-integration.yml wolfsm.yml xcode.yml zephyr-4.x.yml zephyr.ymlIDE
ARDUINO
Arduino_README_prepend.md README.md include.am keywords.txt library.properties.template wolfssl-arduino.cpp wolfssl-arduino.sh wolfssl.hECLIPSE
Espressif
ESP-IDF
examples
template
CMakeLists.txt Makefile README.md partitions_singleapp_large.csv sdkconfig.defaults sdkconfig.defaults.esp8266wolfssl_benchmark
VisualGDB
wolfssl_benchmark_IDF_v4.4_ESP32.sln wolfssl_benchmark_IDF_v4.4_ESP32.vgdbproj wolfssl_benchmark_IDF_v5_ESP32.sln wolfssl_benchmark_IDF_v5_ESP32.vgdbproj wolfssl_benchmark_IDF_v5_ESP32C3.sln wolfssl_benchmark_IDF_v5_ESP32C3.vgdbproj wolfssl_benchmark_IDF_v5_ESP32S3.sln wolfssl_benchmark_IDF_v5_ESP32S3.vgdbprojwolfssl_client
CMakeLists.txt Makefile README.md README_server_sm.md partitions_singleapp_large.csv sdkconfig.defaults sdkconfig.defaults.esp32c2 sdkconfig.defaults.esp8266 wolfssl_client_ESP8266.vgdbprojwolfssl_server
CMakeLists.txt Makefile README.md README_server_sm.md partitions_singleapp_large.csv sdkconfig.defaults sdkconfig.defaults.esp32c2 sdkconfig.defaults.esp8266 wolfssl_server_ESP8266.vgdbprojwolfssl_test
VisualGDB
wolfssl_test-IDF_v5_ESP32.sln wolfssl_test-IDF_v5_ESP32.vgdbproj wolfssl_test-IDF_v5_ESP32C3.sln wolfssl_test-IDF_v5_ESP32C3.vgdbproj wolfssl_test-IDF_v5_ESP32C6.sln wolfssl_test-IDF_v5_ESP32C6.vgdbproj wolfssl_test_IDF_v5_ESP32S3.sln wolfssl_test_IDF_v5_ESP32S3.vgdbprojGCC-ARM
Makefile Makefile.bench Makefile.client Makefile.common Makefile.server Makefile.static Makefile.test README.md include.am linker.ld linker_fips.ldIAR-EWARM
embOS
SAMV71_XULT
embOS_SAMV71_XULT_user_settings
user_settings.h user_settings_simple_example.h user_settings_verbose_example.hembOS_wolfcrypt_benchmark_SAMV71_XULT
README_wolfcrypt_benchmark wolfcrypt_benchmark.ewd wolfcrypt_benchmark.ewpINTIME-RTOS
Makefile README.md include.am libwolfssl.c libwolfssl.vcxproj user_settings.h wolfExamples.c wolfExamples.h wolfExamples.sln wolfExamples.vcxproj wolfssl-lib.sln wolfssl-lib.vcxprojMQX
Makefile README-jp.md README.md client-tls.c include.am server-tls.c user_config.h user_settings.hMSVS-2019-AZSPHERE
wolfssl_new_azsphere
.gitignore CMakeLists.txt CMakeSettings.json app_manifest.json applibs_versions.h launch.vs.json main.cNETOS
Makefile.wolfcrypt.inc README.md include.am user_settings.h user_settings.h-cert2425 user_settings.h-cert3389 wolfssl_netos_custom.cPlatformIO
examples
wolfssl_benchmark
CMakeLists.txt README.md platformio.ini sdkconfig.defaults wolfssl_benchmark.code-workspaceROWLEY-CROSSWORKS-ARM
Kinetis_FlashPlacement.xml README.md arm_startup.c benchmark_main.c hw.h include.am kinetis_hw.c retarget.c test_main.c user_settings.h wolfssl.hzp wolfssl_ltc.hzpRenesas
e2studio
RA6M3
README.md README_APRA6M_en.md README_APRA6M_jp.md include.amRX72N
EnvisionKit
Simple
README_EN.md README_JP.mdwolfssl_demo
key_data.c key_data.h user_settings.h wolfssl_demo.c wolfssl_demo.h wolfssl_tsip_unit_test.cSTM32Cube
README.md STM32_Benchmarks.md default_conf.ftl include.am main.c wolfssl_example.c wolfssl_example.hWIN
README.txt include.am test.vcxproj user_settings.h user_settings_dtls.h wolfssl-fips.sln wolfssl-fips.vcxprojWIN-SRTP-KDF-140-3
README.txt include.am resource.h test.vcxproj user_settings.h wolfssl-fips.rc wolfssl-fips.sln wolfssl-fips.vcxprojWIN10
README.txt include.am resource.h test.vcxproj user_settings.h wolfssl-fips.rc wolfssl-fips.sln wolfssl-fips.vcxprojXCODE
Benchmark
include.amXilinxSDK
README.md bench.sh combine.sh eclipse_formatter_profile.xml graph.sh include.am user_settings.h wolfssl_example.capple-universal
wolfssl-multiplatform
iotsafe
Makefile README.md ca-cert.c devices.c devices.h include.am main.c memory-tls.c startup.c target.ld user_settings.hmynewt
README.md apps.wolfcrypttest.pkg.yml crypto.wolfssl.pkg.yml crypto.wolfssl.syscfg.yml include.am setup.shcerts
1024
ca-cert.der ca-cert.pem ca-key.der ca-key.pem client-cert.der client-cert.pem client-key.der client-key.pem client-keyPub.der dh1024.der dh1024.pem dsa-pub-1024.pem dsa1024.der dsa1024.pem include.am rsa1024.der server-cert.der server-cert.pem server-key.der server-key.pemcrl
extra-crls
ca-int-cert-revoked.pem claim-root.pem crl_critical_entry.pem crlnum_57oct.pem crlnum_64oct.pem general-server-crl.pem large_crlnum.pem large_crlnum2.pemdilithium
bench_dilithium_level2_key.der bench_dilithium_level3_key.der bench_dilithium_level5_key.der include.amecc
bp256r1-key.der bp256r1-key.pem ca-secp256k1-cert.pem ca-secp256k1-key.pem client-bp256r1-cert.der client-bp256r1-cert.pem client-secp256k1-cert.der client-secp256k1-cert.pem genecc.sh include.am secp256k1-key.der secp256k1-key.pem secp256k1-param.pem secp256k1-privkey.der secp256k1-privkey.pem server-bp256r1-cert.der server-bp256r1-cert.pem server-secp256k1-cert.der server-secp256k1-cert.pem server2-secp256k1-cert.der server2-secp256k1-cert.pem wolfssl.cnf wolfssl_384.cnfed25519
ca-ed25519-key.der ca-ed25519-key.pem ca-ed25519-priv.der ca-ed25519-priv.pem ca-ed25519.der ca-ed25519.pem client-ed25519-key.der client-ed25519-key.pem client-ed25519-priv.der client-ed25519-priv.pem client-ed25519.der client-ed25519.pem eddsa-ed25519.der eddsa-ed25519.pem gen-ed25519-certs.sh gen-ed25519-keys.sh gen-ed25519.sh include.am root-ed25519-key.der root-ed25519-key.pem root-ed25519-priv.der root-ed25519-priv.pem root-ed25519.der root-ed25519.pem server-ed25519-cert.pem server-ed25519-key.der server-ed25519-key.pem server-ed25519-priv.der server-ed25519-priv.pem server-ed25519.der server-ed25519.pemed448
ca-ed448-key.der ca-ed448-key.pem ca-ed448-priv.der ca-ed448-priv.pem ca-ed448.der ca-ed448.pem client-ed448-key.der client-ed448-key.pem client-ed448-priv.der client-ed448-priv.pem client-ed448.der client-ed448.pem gen-ed448-certs.sh gen-ed448-keys.sh include.am root-ed448-key.der root-ed448-key.pem root-ed448-priv.der root-ed448-priv.pem root-ed448.der root-ed448.pem server-ed448-cert.pem server-ed448-key.der server-ed448-key.pem server-ed448-priv.der server-ed448-priv.pem server-ed448.der server-ed448.pemexternal
DigiCertGlobalRootCA.pem README.txt ca-digicert-ev.pem ca-globalsign-root.pem ca-google-root.pem ca_collection.pem include.amintermediate
ca_false_intermediate
gentestcert.sh int_ca.key server.key test_ca.key test_ca.pem test_int_not_cacert.pem test_sign_bynoca_srv.pem wolfssl_base.conf wolfssl_srv.conflms
bc_hss_L2_H5_W8_root.der bc_hss_L3_H5_W4_root.der bc_lms_chain_ca.der bc_lms_chain_leaf.der bc_lms_native_bc_root.der bc_lms_sha256_h10_w8_root.der bc_lms_sha256_h5_w4_root.der include.ammldsa
README.txt include.am mldsa44-cert.der mldsa44-cert.pem mldsa44-key.pem mldsa44_bare-priv.der mldsa44_bare-seed.der mldsa44_oqskeypair.der mldsa44_priv-only.der mldsa44_pub-spki.der mldsa44_seed-only.der mldsa44_seed-priv.der mldsa65-cert.der mldsa65-cert.pem mldsa65-key.pem mldsa65_bare-priv.der mldsa65_bare-seed.der mldsa65_oqskeypair.der mldsa65_priv-only.der mldsa65_pub-spki.der mldsa65_seed-only.der mldsa65_seed-priv.der mldsa87-cert.der mldsa87-cert.pem mldsa87-key.pem mldsa87_bare-priv.der mldsa87_bare-seed.der mldsa87_oqskeypair.der mldsa87_priv-only.der mldsa87_pub-spki.der mldsa87_seed-only.der mldsa87_seed-priv.derocsp
imposter-root-ca-cert.der imposter-root-ca-cert.pem imposter-root-ca-key.der imposter-root-ca-key.pem include.am index-ca-and-intermediate-cas.txt index-ca-and-intermediate-cas.txt.attr index-intermediate1-ca-issued-certs.txt index-intermediate1-ca-issued-certs.txt.attr index-intermediate2-ca-issued-certs.txt index-intermediate2-ca-issued-certs.txt.attr index-intermediate3-ca-issued-certs.txt index-intermediate3-ca-issued-certs.txt.attr intermediate1-ca-cert.der intermediate1-ca-cert.pem intermediate1-ca-key.der intermediate1-ca-key.pem intermediate2-ca-cert.der intermediate2-ca-cert.pem intermediate2-ca-key.der intermediate2-ca-key.pem intermediate3-ca-cert.der intermediate3-ca-cert.pem intermediate3-ca-key.der intermediate3-ca-key.pem ocsp-responder-cert.der ocsp-responder-cert.pem ocsp-responder-key.der ocsp-responder-key.pem openssl.cnf renewcerts-for-test.sh renewcerts.sh root-ca-cert.der root-ca-cert.pem root-ca-crl.pem root-ca-key.der root-ca-key.pem server1-cert.der server1-cert.pem server1-chain-noroot.pem server1-key.der server1-key.pem server2-cert.der server2-cert.pem server2-key.der server2-key.pem server3-cert.der server3-cert.pem server3-key.der server3-key.pem server4-cert.der server4-cert.pem server4-key.der server4-key.pem server5-cert.der server5-cert.pem server5-key.der server5-key.pem test-leaf-response.der test-multi-response.der test-response-nointern.der test-response-rsapss.der test-response.derp521
ca-p521-key.der ca-p521-key.pem ca-p521-priv.der ca-p521-priv.pem ca-p521.der ca-p521.pem client-p521-key.der client-p521-key.pem client-p521-priv.der client-p521-priv.pem client-p521.der client-p521.pem gen-p521-certs.sh gen-p521-keys.sh include.am root-p521-key.der root-p521-key.pem root-p521-priv.der root-p521-priv.pem root-p521.der root-p521.pem server-p521-cert.pem server-p521-key.der server-p521-key.pem server-p521-priv.der server-p521-priv.pem server-p521.der server-p521.pemrpk
client-cert-rpk.der client-ecc-cert-rpk.der include.am server-cert-rpk.der server-ecc-cert-rpk.derrsapss
ca-3072-rsapss-key.der ca-3072-rsapss-key.pem ca-3072-rsapss-priv.der ca-3072-rsapss-priv.pem ca-3072-rsapss.der ca-3072-rsapss.pem ca-rsapss-key.der ca-rsapss-key.pem ca-rsapss-priv.der ca-rsapss-priv.pem ca-rsapss.der ca-rsapss.pem client-3072-rsapss-key.der client-3072-rsapss-key.pem client-3072-rsapss-priv.der client-3072-rsapss-priv.pem client-3072-rsapss.der client-3072-rsapss.pem client-rsapss-key.der client-rsapss-key.pem client-rsapss-priv.der client-rsapss-priv.pem client-rsapss.der client-rsapss.pem gen-rsapss-keys.sh include.am renew-rsapss-certs.sh root-3072-rsapss-key.der root-3072-rsapss-key.pem root-3072-rsapss-priv.der root-3072-rsapss-priv.pem root-3072-rsapss.der root-3072-rsapss.pem root-rsapss-key.der root-rsapss-key.pem root-rsapss-priv.der root-rsapss-priv.pem root-rsapss.der root-rsapss.pem server-3072-rsapss-cert.pem server-3072-rsapss-key.der server-3072-rsapss-key.pem server-3072-rsapss-priv.der server-3072-rsapss-priv.pem server-3072-rsapss.der server-3072-rsapss.pem server-mix-rsapss-cert.pem server-rsapss-cert.pem server-rsapss-key.der server-rsapss-key.pem server-rsapss-priv.der server-rsapss-priv.pem server-rsapss.der server-rsapss.pemslhdsa
bench_slhdsa_sha2_128f_key.der bench_slhdsa_sha2_128s_key.der bench_slhdsa_sha2_192f_key.der bench_slhdsa_sha2_192s_key.der bench_slhdsa_sha2_256f_key.der bench_slhdsa_sha2_256s_key.der bench_slhdsa_shake128f_key.der bench_slhdsa_shake128s_key.der bench_slhdsa_shake192f_key.der bench_slhdsa_shake192s_key.der bench_slhdsa_shake256f_key.der bench_slhdsa_shake256s_key.der client-mldsa44-priv.pem client-mldsa44-sha2.der client-mldsa44-sha2.pem client-mldsa44-shake.der client-mldsa44-shake.pem gen-slhdsa-mldsa-certs.sh include.am root-slhdsa-sha2-128s-priv.der root-slhdsa-sha2-128s-priv.pem root-slhdsa-sha2-128s.der root-slhdsa-sha2-128s.pem root-slhdsa-shake-128s-priv.der root-slhdsa-shake-128s-priv.pem root-slhdsa-shake-128s.der root-slhdsa-shake-128s.pem server-mldsa44-priv.pem server-mldsa44-sha2.der server-mldsa44-sha2.pem server-mldsa44-shake.der server-mldsa44-shake.pemsm2
ca-sm2-key.der ca-sm2-key.pem ca-sm2-priv.der ca-sm2-priv.pem ca-sm2.der ca-sm2.pem client-sm2-key.der client-sm2-key.pem client-sm2-priv.der client-sm2-priv.pem client-sm2.der client-sm2.pem fix_sm2_spki.py gen-sm2-certs.sh gen-sm2-keys.sh include.am root-sm2-key.der root-sm2-key.pem root-sm2-priv.der root-sm2-priv.pem root-sm2.der root-sm2.pem self-sm2-cert.pem self-sm2-key.pem self-sm2-priv.pem server-sm2-cert.der server-sm2-cert.pem server-sm2-key.der server-sm2-key.pem server-sm2-priv.der server-sm2-priv.pem server-sm2.der server-sm2.pemstatickeys
dh-ffdhe2048-params.pem dh-ffdhe2048-pub.der dh-ffdhe2048-pub.pem dh-ffdhe2048.der dh-ffdhe2048.pem ecc-secp256r1.der ecc-secp256r1.pem gen-static.sh include.am x25519-pub.der x25519-pub.pem x25519.der x25519.pemtest
catalog.txt cert-bad-neg-int.der cert-bad-oid.der cert-bad-utf8.der cert-ext-ia.cfg cert-ext-ia.der cert-ext-ia.pem cert-ext-joi.cfg cert-ext-joi.der cert-ext-joi.pem cert-ext-mnc.der cert-ext-multiple.cfg cert-ext-multiple.der cert-ext-multiple.pem cert-ext-nc-combined.der cert-ext-nc-combined.pem cert-ext-nc.cfg cert-ext-nc.der cert-ext-nc.pem cert-ext-ncdns.der cert-ext-ncdns.pem cert-ext-ncip.der cert-ext-ncip.pem cert-ext-ncmixed.der cert-ext-ncmulti.der cert-ext-ncmulti.pem cert-ext-ncrid.der cert-ext-ncrid.pem cert-ext-nct.cfg cert-ext-nct.der cert-ext-nct.pem cert-ext-ndir-exc.cfg cert-ext-ndir-exc.der cert-ext-ndir-exc.pem cert-ext-ndir.cfg cert-ext-ndir.der cert-ext-ndir.pem cert-ext-ns.der cert-over-max-altnames.cfg cert-over-max-altnames.der cert-over-max-altnames.pem cert-over-max-nc.cfg cert-over-max-nc.der cert-over-max-nc.pem client-ecc-cert-ski.hex cn-ip-literal.der cn-ip-wildcard.der crit-cert.pem crit-key.pem dh1024.der dh1024.pem dh512.der dh512.pem digsigku.pem encrypteddata.msg gen-badsig.sh gen-ext-certs.sh gen-testcerts.sh include.am kari-keyid-cms.msg ktri-keyid-cms.msg ossl-trusted-cert.pem server-badaltname.der server-badaltname.pem server-badaltnull.der server-badaltnull.pem server-badcn.der server-badcn.pem server-badcnnull.der server-badcnnull.pem server-cert-ecc-badsig.der server-cert-ecc-badsig.pem server-cert-rsa-badsig.der server-cert-rsa-badsig.pem server-duplicate-policy.pem server-garbage.der server-garbage.pem server-goodalt.der server-goodalt.pem server-goodaltwild.der server-goodaltwild.pem server-goodcn.der server-goodcn.pem server-goodcnwild.der server-goodcnwild.pem server-localhost.der server-localhost.pem smime-test-canon.p7s smime-test-multipart-badsig.p7s smime-test-multipart.p7s smime-test.p7stest-pathlen
assemble-chains.sh chainA-ICA1-key.pem chainA-ICA1-pathlen0.pem chainA-assembled.pem chainA-entity-key.pem chainA-entity.pem chainB-ICA1-key.pem chainB-ICA1-pathlen0.pem chainB-ICA2-key.pem chainB-ICA2-pathlen1.pem chainB-assembled.pem chainB-entity-key.pem chainB-entity.pem chainC-ICA1-key.pem chainC-ICA1-pathlen1.pem chainC-assembled.pem chainC-entity-key.pem chainC-entity.pem chainD-ICA1-key.pem chainD-ICA1-pathlen127.pem chainD-assembled.pem chainD-entity-key.pem chainD-entity.pem chainE-ICA1-key.pem chainE-ICA1-pathlen128.pem chainE-assembled.pem chainE-entity-key.pem chainE-entity.pem chainF-ICA1-key.pem chainF-ICA1-pathlen1.pem chainF-ICA2-key.pem chainF-ICA2-pathlen0.pem chainF-assembled.pem chainF-entity-key.pem chainF-entity.pem chainG-ICA1-key.pem chainG-ICA1-pathlen0.pem chainG-ICA2-key.pem chainG-ICA2-pathlen1.pem chainG-ICA3-key.pem chainG-ICA3-pathlen99.pem chainG-ICA4-key.pem chainG-ICA4-pathlen5.pem chainG-ICA5-key.pem chainG-ICA5-pathlen20.pem chainG-ICA6-key.pem chainG-ICA6-pathlen10.pem chainG-ICA7-key.pem chainG-ICA7-pathlen100.pem chainG-assembled.pem chainG-entity-key.pem chainG-entity.pem chainH-ICA1-key.pem chainH-ICA1-pathlen0.pem chainH-ICA2-key.pem chainH-ICA2-pathlen2.pem chainH-ICA3-key.pem chainH-ICA3-pathlen2.pem chainH-ICA4-key.pem chainH-ICA4-pathlen2.pem chainH-assembled.pem chainH-entity-key.pem chainH-entity.pem chainI-ICA1-key.pem chainI-ICA1-no_pathlen.pem chainI-ICA2-key.pem chainI-ICA2-no_pathlen.pem chainI-ICA3-key.pem chainI-ICA3-pathlen2.pem chainI-assembled.pem chainI-entity-key.pem chainI-entity.pem chainJ-ICA1-key.pem chainJ-ICA1-no_pathlen.pem chainJ-ICA2-key.pem chainJ-ICA2-no_pathlen.pem chainJ-ICA3-key.pem chainJ-ICA3-no_pathlen.pem chainJ-ICA4-key.pem chainJ-ICA4-pathlen2.pem chainJ-assembled.pem chainJ-entity-key.pem chainJ-entity.pem include.am refreshkeys.shtest-serial0
ee_normal.pem ee_serial0.pem generate_certs.sh include.am intermediate_serial0.pem root_serial0.pem root_serial0_key.pem selfsigned_nonca_serial0.pemxmss
bc_xmss_chain_ca.der bc_xmss_chain_leaf.der bc_xmss_sha2_10_256_root.der bc_xmss_sha2_16_256_root.der bc_xmssmt_sha2_20_2_256_root.der bc_xmssmt_sha2_20_4_256_root.der bc_xmssmt_sha2_40_8_256_root.der include.amcmake
Config.cmake.in README.md config.in functions.cmake include.am options.h.in wolfssl-config-version.cmake.in wolfssl-targets.cmake.indebian
changelog.in control.in copyright include.am libwolfssl-dev.install libwolfssl.install rules.indoc
dox_comments
header_files
aes.h arc4.h ascon.h asn.h asn_public.h blake2.h bn.h camellia.h chacha.h chacha20_poly1305.h cmac.h coding.h compress.h cryptocb.h curve25519.h curve448.h des3.h dh.h doxygen_groups.h doxygen_pages.h dsa.h ecc.h eccsi.h ed25519.h ed448.h error-crypt.h evp.h hash.h hmac.h iotsafe.h kdf.h logging.h md2.h md4.h md5.h memory.h ocsp.h pem.h pkcs11.h pkcs7.h poly1305.h psa.h puf.h pwdbased.h quic.h random.h ripemd.h rsa.h sakke.h sha.h sha256.h sha3.h sha512.h signature.h siphash.h srp.h ssl.h tfm.h types.h wc_encrypt.h wc_port.h wc_she.h wc_slhdsa.h wolfio.hheader_files-ja
aes.h arc4.h ascon.h asn.h asn_public.h blake2.h bn.h camellia.h chacha.h chacha20_poly1305.h cmac.h coding.h compress.h cryptocb.h curve25519.h curve448.h des3.h dh.h doxygen_groups.h doxygen_pages.h dsa.h ecc.h eccsi.h ed25519.h ed448.h error-crypt.h evp.h hash.h hmac.h iotsafe.h kdf.h logging.h md2.h md4.h md5.h memory.h ocsp.h pem.h pkcs11.h pkcs7.h poly1305.h psa.h pwdbased.h quic.h random.h ripemd.h rsa.h sakke.h sha.h sha256.h sha3.h sha512.h signature.h siphash.h srp.h ssl.h tfm.h types.h wc_encrypt.h wc_port.h wolfio.hexamples
async
Makefile README.md async_client.c async_server.c async_tls.c async_tls.h include.am user_settings.hconfigs
README.md include.am user_settings_EBSnet.h user_settings_all.h user_settings_arduino.h user_settings_baremetal.h user_settings_ca.h user_settings_curve25519nonblock.h user_settings_dtls13.h user_settings_eccnonblock.h user_settings_espressif.h user_settings_fipsv2.h user_settings_fipsv5.h user_settings_min_ecc.h user_settings_openssl_compat.h user_settings_pkcs7.h user_settings_platformio.h user_settings_pq.h user_settings_rsa_only.h user_settings_stm32.h user_settings_template.h user_settings_tls12.h user_settings_tls13.h user_settings_wolfboot_keytools.h user_settings_wolfssh.h user_settings_wolftpm.hechoclient
echoclient.c echoclient.h echoclient.sln echoclient.vcproj echoclient.vcxproj include.am quitlinuxkm
Kbuild Makefile README.md get_thread_size.c include.am linuxkm-fips-hash-wrapper.sh linuxkm-fips-hash.c linuxkm_memory.c linuxkm_memory.h linuxkm_wc_port.h lkcapi_aes_glue.c lkcapi_dh_glue.c lkcapi_ecdh_glue.c lkcapi_ecdsa_glue.c lkcapi_glue.c lkcapi_rsa_glue.c lkcapi_sha_glue.c module_exports.c.template module_hooks.c pie_redirect_table.c wolfcrypt.lds x86_vector_register_glue.cm4
ax_add_am_macro.m4 ax_am_jobserver.m4 ax_am_macros.m4 ax_append_compile_flags.m4 ax_append_flag.m4 ax_append_link_flags.m4 ax_append_to_file.m4 ax_atomic.m4 ax_bsdkm.m4 ax_check_compile_flag.m4 ax_check_link_flag.m4 ax_compiler_version.m4 ax_count_cpus.m4 ax_create_generic_config.m4 ax_debug.m4 ax_file_escapes.m4 ax_harden_compiler_flags.m4 ax_linuxkm.m4 ax_print_to_file.m4 ax_pthread.m4 ax_require_defined.m4 ax_tls.m4 ax_vcs_checkout.m4 hexversion.m4 lib_socket_nsl.m4 visibility.m4mqx
wolfcrypt_benchmark
ReferencedRSESystems.xml wolfcrypt_benchmark_twrk70f120m_Int_Flash_DDRData_Debug_PnE_U-MultiLink.launch wolfcrypt_benchmark_twrk70f120m_Int_Flash_DDRData_Release_PnE_U-MultiLink.launch wolfcrypt_benchmark_twrk70f120m_Int_Flash_SramData_Debug_JTrace.jlink wolfcrypt_benchmark_twrk70f120m_Int_Flash_SramData_Debug_JTrace.launch wolfcrypt_benchmark_twrk70f120m_Int_Flash_SramData_Debug_PnE_U-MultiLink.launch wolfcrypt_benchmark_twrk70f120m_Int_Flash_SramData_Release_PnE_U-MultiLink.launchwolfcrypt_test
ReferencedRSESystems.xml wolfcrypt_test_twrk70f120m_Int_Flash_DDRData_Debug_PnE_U-MultiLink.launch wolfcrypt_test_twrk70f120m_Int_Flash_DDRData_Release_PnE_U-MultiLink.launch wolfcrypt_test_twrk70f120m_Int_Flash_SramData_Debug_JTrace.jlink wolfcrypt_test_twrk70f120m_Int_Flash_SramData_Debug_JTrace.launch wolfcrypt_test_twrk70f120m_Int_Flash_SramData_Debug_PnE_U-MultiLink.launch wolfcrypt_test_twrk70f120m_Int_Flash_SramData_Release_PnE_U-MultiLink.launchwolfssl_client
ReferencedRSESystems.xml wolfssl_client_twrk70f120m_Int_Flash_DDRData_Debug_PnE_U-MultiLink.launch wolfssl_client_twrk70f120m_Int_Flash_DDRData_Release_PnE_U-MultiLink.launch wolfssl_client_twrk70f120m_Int_Flash_SramData_Debug_JTrace.jlink wolfssl_client_twrk70f120m_Int_Flash_SramData_Debug_JTrace.launch wolfssl_client_twrk70f120m_Int_Flash_SramData_Debug_PnE_U-MultiLink.launch wolfssl_client_twrk70f120m_Int_Flash_SramData_Release_PnE_U-MultiLink.launchscripts
aria-cmake-build-test.sh asn1_oid_sum.pl benchmark.test benchmark_compare.sh cleanup_testfiles.sh crl-gen-openssl.test crl-revoked.test dertoc.pl dtls.test dtlscid.test external.test google.test include.am makedistsmall.sh memtest.sh ocsp-responder-openssl-interop.test ocsp-stapling-with-ca-as-responder.test ocsp-stapling-with-wolfssl-responder.test ocsp-stapling.test ocsp-stapling2.test ocsp-stapling_tls13multi.test ocsp.test openssl.test openssl_srtp.test pem.test ping.test pkcallbacks.test psk.test resume.test rsapss.test sniffer-gen.sh sniffer-ipv6.pcap sniffer-static-rsa.pcap sniffer-testsuite.test sniffer-tls12-keylog.out sniffer-tls12-keylog.pcap sniffer-tls12-keylog.sslkeylog sniffer-tls13-dh-resume.pcap sniffer-tls13-dh.pcap sniffer-tls13-ecc-resume.pcap sniffer-tls13-ecc.pcap sniffer-tls13-hrr.pcap sniffer-tls13-keylog.out sniffer-tls13-keylog.pcap sniffer-tls13-keylog.sslkeylog sniffer-tls13-x25519-resume.pcap sniffer-tls13-x25519.pcap stm32l4-v4_0_1_build.sh tls13.test trusted_peer.test unit.test.in user_settings_asm.shsrc
bio.c conf.c crl.c dtls.c dtls13.c include.am internal.c keys.c ocsp.c pk.c pk_ec.c pk_rsa.c quic.c sniffer.c ssl.c ssl_api_cert.c ssl_api_crl_ocsp.c ssl_api_pk.c ssl_asn1.c ssl_bn.c ssl_certman.c ssl_crypto.c ssl_ech.c ssl_load.c ssl_misc.c ssl_p7p12.c ssl_sess.c ssl_sk.c tls.c tls13.c wolfio.c x509.c x509_str.ctests
api
api.h api_decl.h create_ocsp_test_blobs.py include.am test_aes.c test_aes.h test_arc4.c test_arc4.h test_ascon.c test_ascon.h test_ascon_kats.h test_asn.c test_asn.h test_blake2.c test_blake2.h test_camellia.c test_camellia.h test_certman.c test_certman.h test_chacha.c test_chacha.h test_chacha20_poly1305.c test_chacha20_poly1305.h test_cmac.c test_cmac.h test_curve25519.c test_curve25519.h test_curve448.c test_curve448.h test_des3.c test_des3.h test_dh.c test_dh.h test_digest.h test_dsa.c test_dsa.h test_dtls.c test_dtls.h test_ecc.c test_ecc.h test_ed25519.c test_ed25519.h test_ed448.c test_ed448.h test_evp.c test_evp.h test_evp_cipher.c test_evp_cipher.h test_evp_digest.c test_evp_digest.h test_evp_pkey.c test_evp_pkey.h test_hash.c test_hash.h test_hmac.c test_hmac.h test_md2.c test_md2.h test_md4.c test_md4.h test_md5.c test_md5.h test_mldsa.c test_mldsa.h test_mlkem.c test_mlkem.h test_ocsp.c test_ocsp.h test_ocsp_test_blobs.h test_ossl_asn1.c test_ossl_asn1.h test_ossl_bio.c test_ossl_bio.h test_ossl_bn.c test_ossl_bn.h test_ossl_cipher.c test_ossl_cipher.h test_ossl_dgst.c test_ossl_dgst.h test_ossl_dh.c test_ossl_dh.h test_ossl_dsa.c test_ossl_dsa.h test_ossl_ec.c test_ossl_ec.h test_ossl_ecx.c test_ossl_ecx.h test_ossl_mac.c test_ossl_mac.h test_ossl_obj.c test_ossl_obj.h test_ossl_p7p12.c test_ossl_p7p12.h test_ossl_pem.c test_ossl_pem.h test_ossl_rand.c test_ossl_rand.h test_ossl_rsa.c test_ossl_rsa.h test_ossl_sk.c test_ossl_sk.h test_ossl_x509.c test_ossl_x509.h test_ossl_x509_acert.c test_ossl_x509_acert.h test_ossl_x509_crypto.c test_ossl_x509_crypto.h test_ossl_x509_ext.c test_ossl_x509_ext.h test_ossl_x509_info.c test_ossl_x509_info.h test_ossl_x509_io.c test_ossl_x509_io.h test_ossl_x509_lu.c test_ossl_x509_lu.h test_ossl_x509_name.c test_ossl_x509_name.h test_ossl_x509_pk.c test_ossl_x509_pk.h test_ossl_x509_str.c test_ossl_x509_str.h test_ossl_x509_vp.c test_ossl_x509_vp.h test_pkcs12.c test_pkcs12.h test_pkcs7.c test_pkcs7.h test_poly1305.c test_poly1305.h test_random.c test_random.h test_rc2.c test_rc2.h test_ripemd.c test_ripemd.h test_rsa.c test_rsa.h test_sha.c test_sha.h test_sha256.c test_sha256.h test_sha3.c test_sha3.h test_sha512.c test_sha512.h test_she.c test_she.h test_signature.c test_signature.h test_slhdsa.c test_slhdsa.h test_sm2.c test_sm2.h test_sm3.c test_sm3.h test_sm4.c test_sm4.h test_tls.c test_tls.h test_tls13.c test_tls13.h test_tls_ext.c test_tls_ext.h test_wc_encrypt.c test_wc_encrypt.h test_wolfmath.c test_wolfmath.h test_x509.c test_x509.hwolfcrypt
benchmark
README.md benchmark-VS2022.sln benchmark-VS2022.vcxproj benchmark-VS2022.vcxproj.user benchmark.c benchmark.h benchmark.sln benchmark.vcproj benchmark.vcxproj include.amsrc
port
Espressif
esp_crt_bundle
README.md cacrt_all.pem cacrt_deprecated.pem cacrt_local.pem esp_crt_bundle.c gen_crt_bundle.py pio_install_cryptography.pyRenesas
README.md renesas_common.c renesas_fspsm_aes.c renesas_fspsm_rsa.c renesas_fspsm_sha.c renesas_fspsm_util.c renesas_rx64_hw_sha.c renesas_rx64_hw_util.c renesas_tsip_aes.c renesas_tsip_rsa.c renesas_tsip_sha.c renesas_tsip_util.carm
armv8-32-aes-asm.S armv8-32-aes-asm_c.c armv8-32-chacha-asm.S armv8-32-chacha-asm_c.c armv8-32-curve25519.S armv8-32-curve25519_c.c armv8-32-mlkem-asm.S armv8-32-mlkem-asm_c.c armv8-32-poly1305-asm.S armv8-32-poly1305-asm_c.c armv8-32-sha256-asm.S armv8-32-sha256-asm_c.c armv8-32-sha3-asm.S armv8-32-sha3-asm_c.c armv8-32-sha512-asm.S armv8-32-sha512-asm_c.c armv8-aes-asm.S armv8-aes-asm_c.c armv8-aes.c armv8-chacha-asm.S armv8-chacha-asm_c.c armv8-curve25519.S armv8-curve25519_c.c armv8-mlkem-asm.S armv8-mlkem-asm_c.c armv8-poly1305-asm.S armv8-poly1305-asm_c.c armv8-sha256-asm.S armv8-sha256-asm_c.c armv8-sha256.c armv8-sha3-asm.S armv8-sha3-asm_c.c armv8-sha512-asm.S armv8-sha512-asm_c.c armv8-sha512.c cryptoCell.c cryptoCellHash.c thumb2-aes-asm.S thumb2-aes-asm_c.c thumb2-chacha-asm.S thumb2-chacha-asm_c.c thumb2-curve25519.S thumb2-curve25519_c.c thumb2-mlkem-asm.S thumb2-mlkem-asm_c.c thumb2-poly1305-asm.S thumb2-poly1305-asm_c.c thumb2-sha256-asm.S thumb2-sha256-asm_c.c thumb2-sha3-asm.S thumb2-sha3-asm_c.c thumb2-sha512-asm.S thumb2-sha512-asm_c.ccaam
README.md caam_aes.c caam_doc.pdf caam_driver.c caam_error.c caam_integrity.c caam_qnx.c caam_sha.c wolfcaam_aes.c wolfcaam_cmac.c wolfcaam_ecdsa.c wolfcaam_fsl_nxp.c wolfcaam_hash.c wolfcaam_hmac.c wolfcaam_init.c wolfcaam_qnx.c wolfcaam_rsa.c wolfcaam_seco.c wolfcaam_x25519.cdevcrypto
README.md devcrypto_aes.c devcrypto_ecdsa.c devcrypto_hash.c devcrypto_hmac.c devcrypto_rsa.c devcrypto_x25519.c wc_devcrypto.criscv
riscv-64-aes.c riscv-64-chacha.c riscv-64-poly1305.c riscv-64-sha256.c riscv-64-sha3.c riscv-64-sha512.cwolfssl
openssl
aes.h asn1.h asn1t.h bio.h bn.h buffer.h camellia.h cmac.h cms.h compat_types.h conf.h crypto.h des.h dh.h dsa.h ec.h ec25519.h ec448.h ecdh.h ecdsa.h ed25519.h ed448.h engine.h err.h evp.h fips_rand.h hmac.h include.am kdf.h lhash.h md4.h md5.h modes.h obj_mac.h objects.h ocsp.h opensslconf.h opensslv.h ossl_typ.h pem.h pkcs12.h pkcs7.h rand.h rc4.h ripemd.h rsa.h safestack.h sha.h sha3.h srp.h ssl.h ssl23.h stack.h tls1.h txt_db.h ui.h x509.h x509_vfy.h x509v3.hwolfcrypt
port
Renesas
renesas-fspsm-crypt.h renesas-fspsm-types.h renesas-rx64-hw-crypt.h renesas-tsip-crypt.h renesas_cmn.h renesas_fspsm_internal.h renesas_sync.h renesas_tsip_internal.h renesas_tsip_types.hcaam
caam_driver.h caam_error.h caam_qnx.h wolfcaam.h wolfcaam_aes.h wolfcaam_cmac.h wolfcaam_ecdsa.h wolfcaam_fsl_nxp.h wolfcaam_hash.h wolfcaam_qnx.h wolfcaam_rsa.h wolfcaam_seco.h wolfcaam_sha.h wolfcaam_x25519.hwrapper
Ada
examples
src
aes_verify_main.adb rsa_verify_main.adb sha256_main.adb spark_sockets.adb spark_sockets.ads spark_terminal.adb spark_terminal.ads tls_client.adb tls_client.ads tls_client_main.adb tls_server.adb tls_server.ads tls_server_main.adbtests
src
aes_bindings_tests.adb aes_bindings_tests.ads rsa_verify_bindings_tests.adb rsa_verify_bindings_tests.ads sha256_bindings_tests.adb sha256_bindings_tests.ads tests.adbCSharp
wolfSSL-Example-IOCallbacks
App.config wolfSSL-Example-IOCallbacks.cs wolfSSL-Example-IOCallbacks.csprojwolfSSL-TLS-ServerThreaded
App.config wolfSSL-TLS-ServerThreaded.cs wolfSSL-TLS-ServerThreaded.csprojrust
wolfssl-wolfcrypt
src
aes.rs blake2.rs chacha20_poly1305.rs cmac.rs cmac_mac.rs curve25519.rs dh.rs dilithium.rs ecc.rs ecdsa.rs ed25519.rs ed448.rs fips.rs hkdf.rs hmac.rs hmac_mac.rs kdf.rs lib.rs lms.rs mlkem.rs mlkem_kem.rs pbkdf2_password_hash.rs prf.rs random.rs rsa.rs rsa_pkcs1v15.rs sha.rs sha_digest.rs sys.rstests
test_aes.rs test_blake2.rs test_chacha20_poly1305.rs test_cmac.rs test_cmac_mac.rs test_curve25519.rs test_dh.rs test_dilithium.rs test_ecc.rs test_ecdsa.rs test_ed25519.rs test_ed448.rs test_hkdf.rs test_hmac.rs test_hmac_mac.rs test_kdf.rs test_lms.rs test_mlkem.rs test_mlkem_kem.rs test_pbkdf2_password_hash.rs test_prf.rs test_random.rs test_rsa.rs test_rsa_pkcs1v15.rs test_sha.rs test_sha_digest.rs test_wolfcrypt.rszephyr
samples
wolfssl_benchmark
CMakeLists.txt README install_test.sh prj.conf sample.yaml zephyr_legacy.conf zephyr_v4.1.confwolfssl_test
CMakeLists.txt README install_test.sh prj-no-malloc.conf prj.conf sample.yaml zephyr_legacy.conf zephyr_v4.1.conf
wolfssl/wolfcrypt/src/integer.c
raw
1/* integer.c
2 *
3 * Copyright (C) 2006-2026 wolfSSL Inc.
4 *
5 * This file is part of wolfSSL.
6 *
7 * wolfSSL is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License as published by
9 * the Free Software Foundation; either version 3 of the License, or
10 * (at your option) any later version.
11 *
12 * wolfSSL is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU General Public License for more details.
16 *
17 * You should have received a copy of the GNU General Public License
18 * along with this program; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
20 */
21
22#include <wolfssl/wolfcrypt/libwolfssl_sources.h>
23
24/*
25 * Based on public domain LibTomMath 0.38 by Tom St Denis, tomstdenis@iahu.ca,
26 * http://math.libtomcrypt.com
27 */
28
29#ifndef NO_BIG_INT
30
31#if !defined(USE_FAST_MATH) && defined(USE_INTEGER_HEAP_MATH)
32
33#ifndef WOLFSSL_SP_MATH
34
35#ifdef NO_INLINE
36 #include <wolfssl/wolfcrypt/misc.h>
37#else
38 #define WOLFSSL_MISC_INCLUDED
39 #include <wolfcrypt/src/misc.c>
40#endif
41
42#include <wolfssl/wolfcrypt/wolfmath.h>
43
44#if defined(FREESCALE_LTC_TFM)
45 #include <wolfssl/wolfcrypt/port/nxp/ksdk_port.h>
46#endif
47#ifdef WOLFSSL_DEBUG_MATH
48 #include <stdio.h>
49#endif
50
51#ifdef SHOW_GEN
52 #ifndef NO_STDIO_FILESYSTEM
53 #include <stdio.h>
54 #endif
55#endif
56
57#if defined(WOLFSSL_HAVE_SP_RSA) || defined(WOLFSSL_HAVE_SP_DH)
58#ifdef __cplusplus
59 extern "C" {
60#endif
61WOLFSSL_LOCAL int sp_ModExp_1024(mp_int* base, mp_int* exp, mp_int* mod,
62 mp_int* res);
63WOLFSSL_LOCAL int sp_ModExp_1536(mp_int* base, mp_int* exp, mp_int* mod,
64 mp_int* res);
65WOLFSSL_LOCAL int sp_ModExp_2048(mp_int* base, mp_int* exp, mp_int* mod,
66 mp_int* res);
67WOLFSSL_LOCAL int sp_ModExp_3072(mp_int* base, mp_int* exp, mp_int* mod,
68 mp_int* res);
69WOLFSSL_LOCAL int sp_ModExp_4096(mp_int* base, mp_int* exp, mp_int* mod,
70 mp_int* res);
71#ifdef __cplusplus
72 } /* extern "C" */
73#endif
74#endif
75
76/* reverse an array, used for radix code */
77static void
78bn_reverse (unsigned char *s, int len)
79{
80 int ix, iy;
81 unsigned char t;
82
83 ix = 0;
84 iy = len - 1;
85 while (ix < iy) {
86 t = s[ix];
87 s[ix] = s[iy];
88 s[iy] = t;
89 ++ix;
90 --iy;
91 }
92}
93
94/* math settings check */
95word32 CheckRunTimeSettings(void)
96{
97 return CTC_SETTINGS;
98}
99
100
101/* handle up to 6 inits */
102int mp_init_multi(mp_int* a, mp_int* b, mp_int* c, mp_int* d, mp_int* e,
103 mp_int* f)
104{
105 int res = MP_OKAY;
106
107 if (a) XMEMSET(a, 0, sizeof(mp_int));
108 if (b) XMEMSET(b, 0, sizeof(mp_int));
109 if (c) XMEMSET(c, 0, sizeof(mp_int));
110 if (d) XMEMSET(d, 0, sizeof(mp_int));
111 if (e) XMEMSET(e, 0, sizeof(mp_int));
112 if (f) XMEMSET(f, 0, sizeof(mp_int));
113
114 if (a && ((res = mp_init(a)) != MP_OKAY))
115 return res;
116
117 if (b && ((res = mp_init(b)) != MP_OKAY)) {
118 mp_clear(a);
119 return res;
120 }
121
122 if (c && ((res = mp_init(c)) != MP_OKAY)) {
123 mp_clear(a); mp_clear(b);
124 return res;
125 }
126
127 if (d && ((res = mp_init(d)) != MP_OKAY)) {
128 mp_clear(a); mp_clear(b); mp_clear(c);
129 return res;
130 }
131
132 if (e && ((res = mp_init(e)) != MP_OKAY)) {
133 mp_clear(a); mp_clear(b); mp_clear(c); mp_clear(d);
134 return res;
135 }
136
137 if (f && ((res = mp_init(f)) != MP_OKAY)) {
138 mp_clear(a); mp_clear(b); mp_clear(c); mp_clear(d); mp_clear(e);
139 return res;
140 }
141
142 return res;
143}
144
145
146/* init a new mp_int */
147int mp_init (mp_int * a)
148{
149 /* Safeguard against passing in a null pointer */
150 if (a == NULL)
151 return MP_VAL;
152
153 /* defer allocation until mp_grow */
154 a->dp = NULL;
155
156 /* set the used to zero, allocated digits to the default precision
157 * and sign to positive */
158 a->used = 0;
159 a->alloc = 0;
160 a->sign = MP_ZPOS;
161#ifdef HAVE_WOLF_BIGINT
162 wc_bigint_init(&a->raw);
163#endif
164
165 return MP_OKAY;
166}
167
168
169/* clear one (frees) */
170void mp_clear (mp_int * a)
171{
172#ifdef HAVE_FIPS
173 mp_forcezero(a);
174#else
175 int i;
176
177 if (a == NULL)
178 return;
179
180 /* only do anything if a hasn't been freed previously */
181#ifndef HAVE_WOLF_BIGINT
182 /* When HAVE_WOLF_BIGINT then mp_free -> wc_bigint_free needs to be called
183 * because a->raw->buf may be allocated even when a->dp == NULL. This is the
184 * case for when a zero is loaded into the mp_int. */
185 if (a->dp != NULL)
186#endif
187 {
188 /* first zero the digits */
189 for (i = 0; i < a->used; i++) {
190 a->dp[i] = 0;
191 }
192
193 /* free ram */
194 mp_free(a);
195
196 /* reset members to make debugging easier */
197 a->alloc = a->used = 0;
198 a->sign = MP_ZPOS;
199 }
200#endif
201}
202
203void mp_free (mp_int * a)
204{
205 /* only do anything if a hasn't been freed previously */
206 if (a->dp != NULL) {
207 /* free ram */
208 XFREE(a->dp, 0, DYNAMIC_TYPE_BIGINT);
209 a->dp = NULL;
210 }
211
212#ifdef HAVE_WOLF_BIGINT
213 wc_bigint_free(&a->raw);
214#endif
215}
216
217void mp_forcezero(mp_int * a)
218{
219 if (a == NULL)
220 return;
221
222 /* only do anything if a hasn't been freed previously */
223 if (a->dp != NULL) {
224 /* force zero the used digits */
225 ForceZero(a->dp, a->used * sizeof(mp_digit));
226#ifdef HAVE_WOLF_BIGINT
227 wc_bigint_zero(&a->raw);
228#endif
229 /* free ram */
230 mp_free(a);
231
232 /* reset members to make debugging easier */
233 a->alloc = a->used = 0;
234 a->sign = MP_ZPOS;
235 }
236
237 a->sign = MP_ZPOS;
238 a->used = 0;
239}
240
241
242/* get the size for an unsigned equivalent */
243int mp_unsigned_bin_size (const mp_int * a)
244{
245 int size = mp_count_bits (a);
246 return (size / 8 + ((size & 7) != 0 ? 1 : 0));
247}
248
249
250/* returns the number of bits in an int */
251int mp_count_bits (const mp_int * a)
252{
253 int r;
254 mp_digit q;
255
256 /* shortcut */
257 if (a->used == 0) {
258 return 0;
259 }
260
261 /* get number of digits and add that */
262 r = (a->used - 1) * DIGIT_BIT;
263
264 /* take the last digit and count the bits in it */
265 q = a->dp[a->used - 1];
266 while (q > ((mp_digit) 0)) {
267 ++r;
268 q >>= ((mp_digit) 1);
269 }
270 return r;
271}
272
273
274int mp_leading_bit (mp_int * a)
275{
276 int c = mp_count_bits(a);
277
278 if (c == 0) return 0;
279 return (c % 8) == 0;
280}
281
282int mp_to_unsigned_bin_at_pos(int x, mp_int *t, unsigned char *b)
283{
284 int res = 0;
285 while (mp_iszero(t) == MP_NO) {
286#ifndef MP_8BIT
287 b[x++] = (unsigned char) (t->dp[0] & 255);
288#else
289 b[x++] = (unsigned char) (t->dp[0] | ((t->dp[1] & 0x01) << 7));
290#endif
291 if ((res = mp_div_2d (t, 8, t, NULL)) != MP_OKAY) {
292 return res;
293 }
294 res = x;
295 }
296 return res;
297}
298
299/* store in unsigned [big endian] format */
300int mp_to_unsigned_bin (const mp_int * a, unsigned char *b)
301{
302 int x, res;
303 mp_int t;
304
305 if ((res = mp_init_copy (&t, a)) != MP_OKAY) {
306 return res;
307 }
308
309 x = mp_to_unsigned_bin_at_pos(0, &t, b);
310 if (x < 0) {
311 mp_clear(&t);
312 return x;
313 }
314
315 bn_reverse (b, x);
316 mp_clear (&t);
317 return res;
318}
319
320int mp_to_unsigned_bin_len(mp_int * a, unsigned char *b, int c)
321{
322 int i, len;
323
324 len = mp_unsigned_bin_size(a);
325
326 if (len > c) {
327 return MP_VAL;
328 }
329
330 /* pad front w/ zeros to match length */
331 for (i = 0; i < c - len; i++) {
332 b[i] = 0x00;
333 }
334 return mp_to_unsigned_bin(a, b + i);
335}
336
337/* creates "a" then copies b into it */
338int mp_init_copy (mp_int * a, const mp_int * b)
339{
340 int res;
341
342 if ((res = mp_init_size (a, b->used)) != MP_OKAY) {
343 return res;
344 }
345
346 if((res = mp_copy (b, a)) != MP_OKAY) {
347 mp_clear(a);
348 }
349
350 return res;
351}
352
353
354/* copy, b = a */
355int mp_copy (const mp_int * a, mp_int * b)
356{
357 int res, n;
358
359 /* Safeguard against passing in a null pointer */
360 if (a == NULL || b == NULL)
361 return MP_VAL;
362
363 /* if dst == src do nothing */
364 if (a == b) {
365 return MP_OKAY;
366 }
367
368 /* grow dest */
369 if (b->alloc < a->used || b->alloc == 0) {
370 if ((res = mp_grow (b, a->used)) != MP_OKAY) {
371 return res;
372 }
373 }
374
375 /* zero b and copy the parameters over */
376 {
377 mp_digit *tmpa, *tmpb;
378
379 /* pointer aliases */
380
381 /* source */
382 tmpa = a->dp;
383
384 /* destination */
385 tmpb = b->dp;
386
387 /* copy all the digits */
388 for (n = 0; n < a->used; n++) {
389 *tmpb++ = *tmpa++;
390 }
391
392 /* clear high digits */
393 for (; n < b->used && b->dp; n++) {
394 *tmpb++ = 0;
395 }
396 }
397
398 /* copy used count and sign */
399 b->used = a->used;
400 b->sign = a->sign;
401 return MP_OKAY;
402}
403
404
405/* grow as required */
406int mp_grow (mp_int * a, int size)
407{
408 mp_digit *tmp;
409
410 /* if the alloc size is smaller alloc more ram */
411 if ((a->alloc < size) || (size == 0) || (a->alloc == 0)) {
412 /* ensure there are always at least MP_PREC digits extra on top */
413 size += (MP_PREC * 2) - (size % MP_PREC);
414
415 /* reallocate the array a->dp
416 *
417 * We store the return in a temporary variable
418 * in case the operation failed we don't want
419 * to overwrite the dp member of a.
420 */
421 tmp = (mp_digit *)XREALLOC (a->dp, sizeof (mp_digit) * size, NULL,
422 DYNAMIC_TYPE_BIGINT);
423 if (tmp == NULL) {
424 /* reallocation failed but "a" is still valid [can be freed] */
425 return MP_MEM;
426 }
427
428 /* reallocation succeeded so set a->dp */
429 a->dp = tmp;
430
431 /* zero excess digits */
432 XMEMSET(&a->dp[a->alloc], 0, sizeof (mp_digit) * (size - a->alloc));
433 a->alloc = size;
434 }
435 else if (a->dp == NULL) {
436 /* opportunistic sanity check for null a->dp with nonzero a->alloc */
437 return MP_VAL;
438 }
439 return MP_OKAY;
440}
441
442
443/* shift right by a certain bit count (store quotient in c, optional
444 remainder in d) */
445int mp_div_2d (mp_int * a, int b, mp_int * c, mp_int * d)
446{
447 int D, res;
448 mp_int t;
449
450
451 /* if the shift count is <= 0 then we do no work */
452 if (b <= 0) {
453 res = mp_copy (a, c);
454 if (d != NULL) {
455 mp_zero (d);
456 }
457 return res;
458 }
459
460 if ((res = mp_init (&t)) != MP_OKAY) {
461 return res;
462 }
463
464 /* get the remainder */
465 if (d != NULL) {
466 if ((res = mp_mod_2d (a, b, &t)) != MP_OKAY) {
467 mp_clear (&t);
468 return res;
469 }
470 }
471
472 /* copy */
473 if ((res = mp_copy (a, c)) != MP_OKAY) {
474 mp_clear (&t);
475 return res;
476 }
477
478 /* shift by as many digits in the bit count */
479 if (b >= (int)DIGIT_BIT) {
480 mp_rshd (c, b / DIGIT_BIT);
481 }
482
483 /* shift any bit count < DIGIT_BIT */
484 D = (b % DIGIT_BIT);
485 if (D != 0) {
486 mp_rshb(c, D);
487 }
488 mp_clamp (c);
489 if (d != NULL) {
490 mp_exch (&t, d);
491 }
492 mp_clear (&t);
493 return MP_OKAY;
494}
495
496
497/* set to zero */
498void mp_zero (mp_int * a)
499{
500 int n;
501 mp_digit *tmp;
502
503 if (a == NULL)
504 return;
505
506 a->sign = MP_ZPOS;
507 a->used = 0;
508
509 tmp = a->dp;
510 for (n = 0; tmp != NULL && n < a->alloc; n++) {
511 *tmp++ = 0;
512 }
513}
514
515
516/* trim unused digits
517 *
518 * This is used to ensure that leading zero digits are
519 * trimmed and the leading "used" digit will be non-zero
520 * Typically very fast. Also fixes the sign if there
521 * are no more leading digits
522 */
523void mp_clamp (mp_int * a)
524{
525 /* decrease used while the most significant digit is
526 * zero.
527 */
528 while (a->used > 0 && a->dp[a->used - 1] == 0) {
529 --(a->used);
530 }
531
532 /* reset the sign flag if used == 0 */
533 if (a->used == 0) {
534 a->sign = MP_ZPOS;
535 }
536}
537
538
539/* swap the elements of two integers, for cases where you can't simply swap the
540 * mp_int pointers around
541 */
542int mp_exch (mp_int * a, mp_int * b)
543{
544 mp_int t;
545
546 t = *a;
547 *a = *b;
548 *b = t;
549 return MP_OKAY;
550}
551
552/* Constant-time conditional swap: must not branch on m (leaks scalar bit).
553 * m must be 0 or 1. The t parameter is unused; XOR is performed in place
554 * with a single-digit stack scratch so callers don't need to clear t->dp. */
555int mp_cond_swap_ct_ex (mp_int * a, mp_int * b, int c, int m, mp_int * t)
556{
557 int i;
558 int err;
559 int imask;
560 int idiff;
561 mp_digit mask;
562 mp_digit d;
563
564 (void)t;
565
566 m &= 1;
567 imask = -m;
568 mask = (mp_digit)0 - (mp_digit)m;
569
570 if ((err = mp_grow(a, c)) != MP_OKAY)
571 return err;
572 if ((err = mp_grow(b, c)) != MP_OKAY)
573 return err;
574
575 idiff = (a->used ^ b->used) & imask;
576 a->used ^= idiff;
577 b->used ^= idiff;
578 idiff = (a->sign ^ b->sign) & imask;
579 a->sign ^= idiff;
580 b->sign ^= idiff;
581
582 for (i = 0; i < c; i++) {
583 d = (a->dp[i] ^ b->dp[i]) & mask;
584 a->dp[i] ^= d;
585 b->dp[i] ^= d;
586 }
587
588 return MP_OKAY;
589}
590
591int mp_cond_swap_ct (mp_int * a, mp_int * b, int c, int m)
592{
593 return mp_cond_swap_ct_ex(a, b, c, m, NULL);
594}
595
596
597/* shift right a certain number of bits */
598void mp_rshb (mp_int *c, int x)
599{
600 mp_digit *tmpc, mask, shift;
601 mp_digit r, rr;
602 mp_digit D = x;
603
604 /* shifting by a negative number not supported, and shifting by
605 * zero changes nothing.
606 */
607 if (x <= 0) return;
608
609 /* shift digits first if needed */
610 if (x >= DIGIT_BIT) {
611 mp_rshd(c, x / DIGIT_BIT);
612 /* recalculate number of bits to shift */
613 D = x % DIGIT_BIT;
614 /* check if any more shifting needed */
615 if (D == 0) return;
616 }
617
618 /* zero shifted is always zero */
619 if (mp_iszero(c)) return;
620
621 /* mask */
622 mask = (((mp_digit)1) << D) - 1;
623
624 /* shift for lsb */
625 shift = DIGIT_BIT - D;
626
627 /* alias */
628 tmpc = c->dp + (c->used - 1);
629
630 /* carry */
631 r = 0;
632 for (x = c->used - 1; x >= 0; x--) {
633 /* get the lower bits of this word in a temp */
634 rr = *tmpc & mask;
635
636 /* shift the current word and mix in the carry bits from previous word */
637 *tmpc = (*tmpc >> D) | (r << shift);
638 --tmpc;
639
640 /* set the carry to the carry bits of the current word found above */
641 r = rr;
642 }
643 mp_clamp(c);
644}
645
646
647/* shift right a certain amount of digits */
648void mp_rshd (mp_int * a, int b)
649{
650 int x;
651
652 /* if b <= 0 then ignore it */
653 if (b <= 0) {
654 return;
655 }
656
657 /* if b > used then simply zero it and return */
658 if (a->used <= b) {
659 mp_zero (a);
660 return;
661 }
662
663 {
664 mp_digit *bottom, *top;
665
666 /* shift the digits down */
667
668 /* bottom */
669 bottom = a->dp;
670
671 /* top [offset into digits] */
672 top = a->dp + b;
673
674 /* this is implemented as a sliding window where
675 * the window is b-digits long and digits from
676 * the top of the window are copied to the bottom
677 *
678 * e.g.
679
680 b-2 | b-1 | b0 | b1 | b2 | ... | bb | ---->
681 /\ | ---->
682 \-------------------/ ---->
683 */
684 for (x = 0; x < (a->used - b); x++) {
685 *bottom++ = *top++;
686 }
687
688 /* zero the top digits */
689 for (; x < a->used; x++) {
690 *bottom++ = 0;
691 }
692 }
693
694 /* remove excess digits */
695 a->used -= b;
696}
697
698
699/* calc a value mod 2**b */
700int mp_mod_2d (mp_int * a, int b, mp_int * c)
701{
702 int x, res, bmax;
703
704 /* if b is <= 0 then zero the int */
705 if (b <= 0) {
706 mp_zero (c);
707 return MP_OKAY;
708 }
709
710 /* if the modulus is larger than the value than return */
711 if (a->sign == MP_ZPOS && b >= (int) (a->used * DIGIT_BIT)) {
712 res = mp_copy (a, c);
713 return res;
714 }
715
716 /* copy */
717 if ((res = mp_copy (a, c)) != MP_OKAY) {
718 return res;
719 }
720
721 /* calculate number of digits in mod value */
722 bmax = (b / DIGIT_BIT) + ((b % DIGIT_BIT) == 0 ? 0 : 1);
723 /* zero digits above the last digit of the modulus */
724 for (x = bmax; x < c->used; x++) {
725 c->dp[x] = 0;
726 }
727
728 if (c->sign == MP_NEG) {
729 mp_digit carry = 0;
730
731 /* grow result to size of modulus */
732 if ((res = mp_grow(c, bmax)) != MP_OKAY) {
733 return res;
734 }
735 /* negate value */
736 for (x = 0; x < c->used; x++) {
737 mp_digit next = c->dp[x] > 0;
738 c->dp[x] = ((mp_digit)0 - c->dp[x] - carry) & MP_MASK;
739 carry |= next;
740 }
741 for (; x < bmax; x++) {
742 c->dp[x] = ((mp_digit)0 - carry) & MP_MASK;
743 }
744 c->used = bmax;
745 c->sign = MP_ZPOS;
746 }
747
748 /* clear the digit that is not completely outside/inside the modulus */
749 x = DIGIT_BIT - (b % DIGIT_BIT);
750 if (x != DIGIT_BIT) {
751 c->dp[bmax - 1] &=
752 ((mp_digit)~((mp_digit)0)) >> (x + ((sizeof(mp_digit)*8) - DIGIT_BIT));
753 }
754 mp_clamp (c);
755 return MP_OKAY;
756}
757
758
759/* reads a unsigned char array, assumes the msb is stored first [big endian] */
760int mp_read_unsigned_bin (mp_int * a, const unsigned char *b, int c)
761{
762 int res;
763 int digits_needed;
764
765 while (c > 0 && b[0] == 0) {
766 c--;
767 b++;
768 }
769
770 digits_needed = ((c * CHAR_BIT) + DIGIT_BIT - 1) / DIGIT_BIT;
771
772 /* make sure there are enough digits available */
773 if (a->alloc < digits_needed) {
774 if ((res = mp_grow(a, digits_needed)) != MP_OKAY) {
775 return res;
776 }
777 }
778
779 /* zero the int */
780 mp_zero (a);
781
782 /* read the bytes in */
783 while (c-- > 0) {
784 if ((res = mp_mul_2d (a, 8, a)) != MP_OKAY) {
785 return res;
786 }
787
788#ifndef MP_8BIT
789 a->dp[0] |= *b++;
790 if (a->used == 0)
791 a->used = 1;
792#else
793 a->dp[0] = (*b & MP_MASK);
794 a->dp[1] |= ((*b++ >> 7U) & 1);
795 if (a->used == 0)
796 a->used = 2;
797#endif
798 }
799 mp_clamp (a);
800 return MP_OKAY;
801}
802
803
804/* shift left by a certain bit count */
805int mp_mul_2d (mp_int * a, int b, mp_int * c)
806{
807 mp_digit d;
808 int res;
809
810 /* copy */
811 if (a != c) {
812 if ((res = mp_copy (a, c)) != MP_OKAY) {
813 return res;
814 }
815 }
816
817 if (c->alloc < (int)(c->used + b/DIGIT_BIT + 1)) {
818 if ((res = mp_grow (c, c->used + b / DIGIT_BIT + 1)) != MP_OKAY) {
819 return res;
820 }
821 }
822
823 /* shift by as many digits in the bit count */
824 if (b >= (int)DIGIT_BIT) {
825 if ((res = mp_lshd (c, b / DIGIT_BIT)) != MP_OKAY) {
826 return res;
827 }
828 }
829
830 /* shift any bit count < DIGIT_BIT */
831 d = (mp_digit) (b % DIGIT_BIT);
832 if (d != 0) {
833 mp_digit *tmpc, shift, mask, r, rr;
834 int x;
835
836 /* bitmask for carries */
837 mask = (((mp_digit)1) << d) - 1;
838
839 /* shift for msbs */
840 shift = DIGIT_BIT - d;
841
842 /* alias */
843 tmpc = c->dp;
844
845 /* carry */
846 r = 0;
847 for (x = 0; x < c->used; x++) {
848 /* get the higher bits of the current word */
849 rr = (*tmpc >> shift) & mask;
850
851 /* shift the current word and OR in the carry */
852 *tmpc = (mp_digit)(((*tmpc << d) | r) & MP_MASK);
853 ++tmpc;
854
855 /* set the carry to the carry bits of the current word */
856 r = rr;
857 }
858
859 /* set final carry */
860 if (r != 0) {
861 c->dp[(c->used)++] = r;
862 }
863 }
864 mp_clamp (c);
865 return MP_OKAY;
866}
867
868
869/* shift left a certain amount of digits */
870int mp_lshd (mp_int * a, int b)
871{
872 int x, res;
873
874 /* if its less than zero return */
875 if (b <= 0) {
876 return MP_OKAY;
877 }
878
879 /* grow to fit the new digits */
880 if (a->alloc < a->used + b) {
881 if ((res = mp_grow (a, a->used + b)) != MP_OKAY) {
882 return res;
883 }
884 }
885
886 {
887 mp_digit *top, *bottom;
888
889 /* increment the used by the shift amount then copy upwards */
890 a->used += b;
891
892 /* top */
893 top = a->dp + a->used - 1;
894
895 /* base */
896 bottom = a->dp + a->used - 1 - b;
897
898 /* much like mp_rshd this is implemented using a sliding window
899 * except the window goes the other way around. Copying from
900 * the bottom to the top. see bn_mp_rshd.c for more info.
901 */
902 for (x = a->used - 1; x >= b; x--) {
903 *top-- = *bottom--;
904 }
905
906 /* zero the lower digits */
907 top = a->dp;
908 for (x = 0; x < b; x++) {
909 *top++ = 0;
910 }
911 }
912 return MP_OKAY;
913}
914
915
916/* this is a shell function that calls either the normal or Montgomery
917 * exptmod functions. Originally the call to the montgomery code was
918 * embedded in the normal function but that wasted a lot of stack space
919 * for nothing (since 99% of the time the Montgomery code would be called)
920 */
921#if defined(FREESCALE_LTC_TFM)
922int wolfcrypt_mp_exptmod (mp_int * G, mp_int * X, mp_int * P, mp_int * Y)
923#else
924 int mp_exptmod (mp_int * G, mp_int * X, mp_int * P, mp_int * Y) /* //NOLINT(misc-no-recursion) */
925#endif
926{
927 int dr;
928
929 /* modulus P must be positive */
930 if (mp_iszero(P) || P->sign == MP_NEG) {
931 return MP_VAL;
932 }
933 if (mp_isone(P)) {
934 return mp_set(Y, 0);
935 }
936 if (mp_iszero(X)) {
937 return mp_set(Y, 1);
938 }
939 if (mp_iszero(G)) {
940 return mp_set(Y, 0);
941 }
942
943 /* if exponent X is negative we have to recurse */
944 if (X->sign == MP_NEG) {
945#ifdef BN_MP_INVMOD_C
946 mp_int tmpG, tmpX;
947 int err;
948
949 /* first compute 1/G mod P */
950 if ((err = mp_init(&tmpG)) != MP_OKAY) {
951 return err;
952 }
953 if ((err = mp_invmod(G, P, &tmpG)) != MP_OKAY) {
954 mp_clear(&tmpG);
955 return err;
956 }
957
958 /* now get |X| */
959 if ((err = mp_init(&tmpX)) != MP_OKAY) {
960 mp_clear(&tmpG);
961 return err;
962 }
963 if ((err = mp_abs(X, &tmpX)) != MP_OKAY) {
964 mp_clear(&tmpG);
965 mp_clear(&tmpX);
966 return err;
967 }
968
969 /* and now compute (1/G)**|X| instead of G**X [X < 0] */
970 err = mp_exptmod(&tmpG, &tmpX, P, Y);
971 mp_clear(&tmpG);
972 mp_clear(&tmpX);
973 return err;
974#else
975 /* no invmod */
976 return MP_VAL;
977#endif
978 }
979
980#ifdef BN_MP_EXPTMOD_BASE_2
981 if (G->used == 1 && G->dp[0] == 2 && mp_isodd(P) == MP_YES) {
982 return mp_exptmod_base_2(X, P, Y);
983 }
984#endif
985
986/* modified diminished radix reduction */
987#if defined(BN_MP_REDUCE_IS_2K_L_C) && defined(BN_MP_REDUCE_2K_L_C) && \
988 defined(BN_S_MP_EXPTMOD_C)
989 if (mp_reduce_is_2k_l(P) == MP_YES) {
990 return s_mp_exptmod(G, X, P, Y, 1);
991 }
992#endif
993
994#ifdef BN_MP_DR_IS_MODULUS_C
995 /* is it a DR modulus? */
996 dr = mp_dr_is_modulus(P);
997#else
998 /* default to no */
999 dr = 0;
1000#endif
1001
1002 (void)dr;
1003
1004#ifdef BN_MP_REDUCE_IS_2K_C
1005 /* if not, is it a unrestricted DR modulus? */
1006 if (dr == 0) {
1007 dr = mp_reduce_is_2k(P) << 1;
1008 }
1009#endif
1010
1011 /* if the modulus is odd use the montgomery method, or use other known */
1012#ifdef BN_MP_EXPTMOD_FAST_C
1013 if (mp_isodd (P) == MP_YES || dr != 0) {
1014 return mp_exptmod_fast (G, X, P, Y, dr);
1015 } else {
1016#endif
1017#ifdef BN_S_MP_EXPTMOD_C
1018 /* otherwise use the generic Barrett reduction technique */
1019 return s_mp_exptmod (G, X, P, Y, 0);
1020#else
1021 /* no exptmod for evens */
1022 return MP_VAL;
1023#endif
1024#ifdef BN_MP_EXPTMOD_FAST_C
1025 }
1026#endif
1027}
1028
1029int mp_exptmod_ex (mp_int * G, mp_int * X, int digits, mp_int * P, mp_int * Y)
1030{
1031 (void)digits;
1032 return mp_exptmod(G, X, P, Y);
1033}
1034
1035/* b = |a|
1036 *
1037 * Simple function copies the input and fixes the sign to positive
1038 */
1039int mp_abs (mp_int * a, mp_int * b)
1040{
1041 int res;
1042
1043 /* copy a to b */
1044 if (a != b) {
1045 if ((res = mp_copy (a, b)) != MP_OKAY) {
1046 return res;
1047 }
1048 }
1049
1050 /* force the sign of b to positive */
1051 b->sign = MP_ZPOS;
1052
1053 return MP_OKAY;
1054}
1055
1056
1057/* hac 14.61, pp608 */
1058#if defined(FREESCALE_LTC_TFM)
1059int wolfcrypt_mp_invmod(mp_int * a, mp_int * b, mp_int * c)
1060#else
1061int mp_invmod (mp_int * a, mp_int * b, mp_int * c)
1062#endif
1063{
1064 /* b cannot be negative or zero, and can not divide by 0 (1/a mod b) */
1065 if (b->sign == MP_NEG || mp_iszero(b) == MP_YES || mp_iszero(a) == MP_YES) {
1066 return MP_VAL;
1067 }
1068
1069#ifdef BN_FAST_MP_INVMOD_C
1070 /* if the modulus is odd we can use a faster routine instead */
1071 if ((mp_isodd(b) == MP_YES) && (mp_cmp_d(b, 1) != MP_EQ)) {
1072 return fast_mp_invmod (a, b, c);
1073 }
1074#endif
1075
1076#ifdef BN_MP_INVMOD_SLOW_C
1077 return mp_invmod_slow(a, b, c);
1078#else
1079 return MP_VAL;
1080#endif
1081}
1082
1083
1084/* computes the modular inverse via binary extended euclidean algorithm,
1085 * that is c = 1/a mod b
1086 *
1087 * Based on slow invmod except this is optimized for the case where b is
1088 * odd as per HAC Note 14.64 on pp. 610
1089 */
1090int fast_mp_invmod (mp_int * a, mp_int * b, mp_int * c)
1091{
1092 mp_int x, y, u, v, B, D;
1093 int res, loop_check = 0;
1094
1095 /* 2. [modified] b must be odd */
1096 if (mp_iseven (b) == MP_YES) {
1097 return MP_VAL;
1098 }
1099
1100 /* init all our temps */
1101 if ((res = mp_init_multi(&x, &y, &u, &v, &B, &D)) != MP_OKAY) {
1102 return res;
1103 }
1104
1105 /* x == modulus, y == value to invert */
1106 if ((res = mp_copy (b, &x)) != MP_OKAY) {
1107 goto LBL_ERR;
1108 }
1109
1110 /* we need y = |a| */
1111 if ((res = mp_mod (a, b, &y)) != MP_OKAY) {
1112 goto LBL_ERR;
1113 }
1114
1115 if (mp_iszero (&y) == MP_YES) {
1116 /* invmod doesn't exist for this a and b */
1117 res = MP_VAL;
1118 goto LBL_ERR;
1119 }
1120
1121 /* 3. u=x, v=y, A=1, B=0, C=0,D=1 */
1122 if ((res = mp_copy (&x, &u)) != MP_OKAY) {
1123 goto LBL_ERR;
1124 }
1125 if ((res = mp_copy (&y, &v)) != MP_OKAY) {
1126 goto LBL_ERR;
1127 }
1128 if ((res = mp_set (&D, 1)) != MP_OKAY) {
1129 goto LBL_ERR;
1130 }
1131
1132top:
1133 /* 4. while u is even do */
1134 while (mp_iseven (&u) == MP_YES) {
1135 /* 4.1 u = u/2 */
1136 if ((res = mp_div_2 (&u, &u)) != MP_OKAY) {
1137 goto LBL_ERR;
1138 }
1139 /* 4.2 if B is odd then */
1140 if (mp_isodd (&B) == MP_YES) {
1141 if ((res = mp_sub (&B, &x, &B)) != MP_OKAY) {
1142 goto LBL_ERR;
1143 }
1144 }
1145 /* B = B/2 */
1146 if ((res = mp_div_2 (&B, &B)) != MP_OKAY) {
1147 goto LBL_ERR;
1148 }
1149 }
1150
1151 /* 5. while v is even do */
1152 while (mp_iseven (&v) == MP_YES) {
1153 /* 5.1 v = v/2 */
1154 if ((res = mp_div_2 (&v, &v)) != MP_OKAY) {
1155 goto LBL_ERR;
1156 }
1157 /* 5.2 if D is odd then */
1158 if (mp_isodd (&D) == MP_YES) {
1159 /* D = (D-x)/2 */
1160 if ((res = mp_sub (&D, &x, &D)) != MP_OKAY) {
1161 goto LBL_ERR;
1162 }
1163 }
1164 /* D = D/2 */
1165 if ((res = mp_div_2 (&D, &D)) != MP_OKAY) {
1166 goto LBL_ERR;
1167 }
1168 }
1169
1170 /* 6. if u >= v then */
1171 if (mp_cmp (&u, &v) != MP_LT) {
1172 /* u = u - v, B = B - D */
1173 if ((res = mp_sub (&u, &v, &u)) != MP_OKAY) {
1174 goto LBL_ERR;
1175 }
1176
1177 if ((res = mp_sub (&B, &D, &B)) != MP_OKAY) {
1178 goto LBL_ERR;
1179 }
1180 } else {
1181 /* v - v - u, D = D - B */
1182 if ((res = mp_sub (&v, &u, &v)) != MP_OKAY) {
1183 goto LBL_ERR;
1184 }
1185
1186 if ((res = mp_sub (&D, &B, &D)) != MP_OKAY) {
1187 goto LBL_ERR;
1188 }
1189 }
1190
1191 /* if not zero goto step 4 */
1192 if (mp_iszero (&u) == MP_NO) {
1193 if (++loop_check > MAX_INVMOD_SZ) {
1194 res = MP_VAL;
1195 goto LBL_ERR;
1196 }
1197 goto top;
1198 }
1199
1200 /* now a = C, b = D, gcd == g*v */
1201
1202 /* if v != 1 then there is no inverse */
1203 if (mp_cmp_d (&v, 1) != MP_EQ) {
1204 res = MP_VAL;
1205 goto LBL_ERR;
1206 }
1207
1208 /* b is now the inverse */
1209 while (D.sign == MP_NEG) {
1210 if ((res = mp_add (&D, b, &D)) != MP_OKAY) {
1211 goto LBL_ERR;
1212 }
1213 }
1214 /* too big */
1215 while (mp_cmp_mag(&D, b) != MP_LT) {
1216 if ((res = mp_sub(&D, b, &D)) != MP_OKAY) {
1217 goto LBL_ERR;
1218 }
1219 }
1220 mp_exch (&D, c);
1221 res = MP_OKAY;
1222
1223LBL_ERR:mp_clear(&x);
1224 mp_clear(&y);
1225 mp_clear(&u);
1226 mp_clear(&v);
1227 mp_clear(&B);
1228 mp_clear(&D);
1229 return res;
1230}
1231
1232
1233/* hac 14.61, pp608 */
1234int mp_invmod_slow (mp_int * a, mp_int * b, mp_int * c)
1235{
1236 mp_int x, y, u, v, A, B, C, D;
1237 int res;
1238
1239 /* b cannot be negative */
1240 if (b->sign == MP_NEG || mp_iszero(b) == MP_YES) {
1241 return MP_VAL;
1242 }
1243
1244 /* init temps */
1245 if ((res = mp_init_multi(&x, &y, &u, &v,
1246 &A, &B)) != MP_OKAY) {
1247 return res;
1248 }
1249
1250 /* init rest of tmps temps */
1251 if ((res = mp_init_multi(&C, &D, 0, 0, 0, 0)) != MP_OKAY) {
1252 mp_clear(&x);
1253 mp_clear(&y);
1254 mp_clear(&u);
1255 mp_clear(&v);
1256 mp_clear(&A);
1257 mp_clear(&B);
1258 return res;
1259 }
1260
1261 /* x = a, y = b */
1262 if ((res = mp_mod(a, b, &x)) != MP_OKAY) {
1263 goto LBL_ERR;
1264 }
1265
1266 if (mp_iszero (&x) == MP_YES) {
1267 /* invmod doesn't exist for this a and b */
1268 res = MP_VAL;
1269 goto LBL_ERR;
1270 }
1271
1272 if (mp_isone(&x)) {
1273 res = mp_set(c, 1);
1274 goto LBL_ERR;
1275 }
1276 if ((res = mp_copy (b, &y)) != MP_OKAY) {
1277 goto LBL_ERR;
1278 }
1279
1280 /* 2. [modified] if x,y are both even then return an error! */
1281 if (mp_iseven (&x) == MP_YES && mp_iseven (&y) == MP_YES) {
1282 res = MP_VAL;
1283 goto LBL_ERR;
1284 }
1285
1286 /* 3. u=x, v=y, A=1, B=0, C=0,D=1 */
1287 if ((res = mp_copy (&x, &u)) != MP_OKAY) {
1288 goto LBL_ERR;
1289 }
1290 if ((res = mp_copy (&y, &v)) != MP_OKAY) {
1291 goto LBL_ERR;
1292 }
1293 if ((res = mp_set (&A, 1)) != MP_OKAY) {
1294 goto LBL_ERR;
1295 }
1296 if ((res = mp_set (&D, 1)) != MP_OKAY) {
1297 goto LBL_ERR;
1298 }
1299
1300top:
1301 /* 4. while u is even do */
1302 while (mp_iseven (&u) == MP_YES) {
1303 /* 4.1 u = u/2 */
1304 if ((res = mp_div_2 (&u, &u)) != MP_OKAY) {
1305 goto LBL_ERR;
1306 }
1307 /* 4.2 if A or B is odd then */
1308 if (mp_isodd (&A) == MP_YES || mp_isodd (&B) == MP_YES) {
1309 /* A = (A+y)/2, B = (B-x)/2 */
1310 if ((res = mp_add (&A, &y, &A)) != MP_OKAY) {
1311 goto LBL_ERR;
1312 }
1313 if ((res = mp_sub (&B, &x, &B)) != MP_OKAY) {
1314 goto LBL_ERR;
1315 }
1316 }
1317 /* A = A/2, B = B/2 */
1318 if ((res = mp_div_2 (&A, &A)) != MP_OKAY) {
1319 goto LBL_ERR;
1320 }
1321 if ((res = mp_div_2 (&B, &B)) != MP_OKAY) {
1322 goto LBL_ERR;
1323 }
1324 }
1325
1326 /* 5. while v is even do */
1327 while (mp_iseven (&v) == MP_YES) {
1328 /* 5.1 v = v/2 */
1329 if ((res = mp_div_2 (&v, &v)) != MP_OKAY) {
1330 goto LBL_ERR;
1331 }
1332 /* 5.2 if C or D is odd then */
1333 if (mp_isodd (&C) == MP_YES || mp_isodd (&D) == MP_YES) {
1334 /* C = (C+y)/2, D = (D-x)/2 */
1335 if ((res = mp_add (&C, &y, &C)) != MP_OKAY) {
1336 goto LBL_ERR;
1337 }
1338 if ((res = mp_sub (&D, &x, &D)) != MP_OKAY) {
1339 goto LBL_ERR;
1340 }
1341 }
1342 /* C = C/2, D = D/2 */
1343 if ((res = mp_div_2 (&C, &C)) != MP_OKAY) {
1344 goto LBL_ERR;
1345 }
1346 if ((res = mp_div_2 (&D, &D)) != MP_OKAY) {
1347 goto LBL_ERR;
1348 }
1349 }
1350
1351 /* 6. if u >= v then */
1352 if (mp_cmp (&u, &v) != MP_LT) {
1353 /* u = u - v, A = A - C, B = B - D */
1354 if ((res = mp_sub (&u, &v, &u)) != MP_OKAY) {
1355 goto LBL_ERR;
1356 }
1357
1358 if ((res = mp_sub (&A, &C, &A)) != MP_OKAY) {
1359 goto LBL_ERR;
1360 }
1361
1362 if ((res = mp_sub (&B, &D, &B)) != MP_OKAY) {
1363 goto LBL_ERR;
1364 }
1365 } else {
1366 /* v - v - u, C = C - A, D = D - B */
1367 if ((res = mp_sub (&v, &u, &v)) != MP_OKAY) {
1368 goto LBL_ERR;
1369 }
1370
1371 if ((res = mp_sub (&C, &A, &C)) != MP_OKAY) {
1372 goto LBL_ERR;
1373 }
1374
1375 if ((res = mp_sub (&D, &B, &D)) != MP_OKAY) {
1376 goto LBL_ERR;
1377 }
1378 }
1379
1380 /* if not zero goto step 4 */
1381 if (mp_iszero (&u) == MP_NO)
1382 goto top;
1383
1384 /* now a = C, b = D, gcd == g*v */
1385
1386 /* if v != 1 then there is no inverse */
1387 if (mp_cmp_d (&v, 1) != MP_EQ) {
1388 res = MP_VAL;
1389 goto LBL_ERR;
1390 }
1391
1392 /* if its too low */
1393 while (mp_cmp_d(&C, 0) == MP_LT) {
1394 if ((res = mp_add(&C, b, &C)) != MP_OKAY) {
1395 goto LBL_ERR;
1396 }
1397 }
1398
1399 /* too big */
1400 while (mp_cmp_mag(&C, b) != MP_LT) {
1401 if ((res = mp_sub(&C, b, &C)) != MP_OKAY) {
1402 goto LBL_ERR;
1403 }
1404 }
1405
1406 /* C is now the inverse */
1407 mp_exch (&C, c);
1408 res = MP_OKAY;
1409LBL_ERR:mp_clear(&x);
1410 mp_clear(&y);
1411 mp_clear(&u);
1412 mp_clear(&v);
1413 mp_clear(&A);
1414 mp_clear(&B);
1415 mp_clear(&C);
1416 mp_clear(&D);
1417 return res;
1418}
1419
1420
1421/* compare magnitude of two ints (unsigned) */
1422int mp_cmp_mag (const mp_int * a, const mp_int * b)
1423{
1424 int n;
1425 const mp_digit *tmpa, *tmpb;
1426
1427 /* compare based on # of non-zero digits */
1428 if (a->used > b->used) {
1429 return MP_GT;
1430 }
1431
1432 if (a->used < b->used) {
1433 return MP_LT;
1434 }
1435
1436 if (a->used == 0)
1437 return MP_EQ;
1438
1439 /* alias for a */
1440 tmpa = a->dp + (a->used - 1);
1441
1442 /* alias for b */
1443 tmpb = b->dp + (a->used - 1);
1444
1445 /* compare based on digits */
1446 for (n = 0; n < a->used; ++n, --tmpa, --tmpb) {
1447 if (*tmpa > *tmpb) {
1448 return MP_GT;
1449 }
1450
1451 if (*tmpa < *tmpb) {
1452 return MP_LT;
1453 }
1454 }
1455 return MP_EQ;
1456}
1457
1458
1459/* compare two ints (signed)*/
1460int mp_cmp (const mp_int * a, const mp_int * b)
1461{
1462 /* compare based on sign */
1463 if (a->sign != b->sign) {
1464 if (a->sign == MP_NEG) {
1465 return MP_LT;
1466 } else {
1467 return MP_GT;
1468 }
1469 }
1470
1471 /* compare digits */
1472 if (a->sign == MP_NEG) {
1473 /* if negative compare opposite direction */
1474 return mp_cmp_mag(b, a);
1475 } else {
1476 return mp_cmp_mag(a, b);
1477 }
1478}
1479
1480
1481/* compare a digit */
1482int mp_cmp_d(mp_int * a, mp_digit b)
1483{
1484 /* special case for zero*/
1485 if (a->used == 0 && b == 0)
1486 return MP_EQ;
1487
1488 /* compare based on sign */
1489 if ((b && a->used == 0) || a->sign == MP_NEG) {
1490 return MP_LT;
1491 }
1492
1493 /* compare based on magnitude */
1494 if (a->used > 1) {
1495 return MP_GT;
1496 }
1497
1498 /* compare the only digit of a to b */
1499 if (a->dp[0] > b) {
1500 return MP_GT;
1501 } else if (a->dp[0] < b) {
1502 return MP_LT;
1503 } else {
1504 return MP_EQ;
1505 }
1506}
1507
1508
1509/* set to a digit */
1510int mp_set (mp_int * a, mp_digit b)
1511{
1512 int res;
1513 mp_zero (a);
1514 res = mp_grow (a, 1);
1515 if (res == MP_OKAY) {
1516 a->dp[0] = (mp_digit)(b & MP_MASK);
1517 a->used = (a->dp[0] != 0) ? 1 : 0;
1518 }
1519 return res;
1520}
1521
1522/* check if a bit is set */
1523int mp_is_bit_set (mp_int *a, mp_digit b)
1524{
1525 mp_digit i = b / DIGIT_BIT; /* word index */
1526 mp_digit s = b % DIGIT_BIT; /* bit index */
1527
1528 if ((mp_digit)a->used <= i) {
1529 /* no words available at that bit count */
1530 return 0;
1531 }
1532
1533 /* get word and shift bit to check down to index 0 */
1534 return (int)((a->dp[i] >> s) & (mp_digit)1);
1535}
1536
1537/* c = a mod b, 0 <= c < b */
1538#if defined(FREESCALE_LTC_TFM)
1539int wolfcrypt_mp_mod(mp_int * a, mp_int * b, mp_int * c)
1540#else
1541int mp_mod (mp_int * a, mp_int * b, mp_int * c)
1542#endif
1543{
1544 mp_int t;
1545 int res;
1546
1547 if ((res = mp_init_size (&t, b->used)) != MP_OKAY) {
1548 return res;
1549 }
1550
1551 if ((res = mp_div (a, b, NULL, &t)) != MP_OKAY) {
1552 mp_clear (&t);
1553 return res;
1554 }
1555
1556 if ((mp_iszero(&t) != MP_NO) || (t.sign == b->sign)) {
1557 res = MP_OKAY;
1558 mp_exch (&t, c);
1559 } else {
1560 res = mp_add (b, &t, c);
1561 }
1562
1563 mp_clear (&t);
1564 return res;
1565}
1566
1567
1568/* slower bit-bang division... also smaller */
1569int mp_div(mp_int * a, mp_int * b, mp_int * c, mp_int * d)
1570{
1571 mp_int ta, tb, tq, q;
1572 int res, n, n2;
1573
1574 /* is divisor zero ? */
1575 if (mp_iszero (b) == MP_YES) {
1576 return MP_VAL;
1577 }
1578
1579 /* if a < b then q=0, r = a */
1580 if (mp_cmp_mag (a, b) == MP_LT) {
1581 if (d != NULL) {
1582 res = mp_copy (a, d);
1583 } else {
1584 res = MP_OKAY;
1585 }
1586 if (c != NULL) {
1587 mp_zero (c);
1588 }
1589 return res;
1590 }
1591
1592 /* init our temps */
1593 if ((res = mp_init_multi(&ta, &tb, &tq, &q, 0, 0)) != MP_OKAY) {
1594 return res;
1595 }
1596
1597 if ((res = mp_set(&tq, 1)) != MP_OKAY) {
1598 return res;
1599 }
1600 n = mp_count_bits(a) - mp_count_bits(b);
1601 if (((res = mp_abs(a, &ta)) != MP_OKAY) ||
1602 ((res = mp_abs(b, &tb)) != MP_OKAY) ||
1603 ((res = mp_mul_2d(&tb, n, &tb)) != MP_OKAY) ||
1604 ((res = mp_mul_2d(&tq, n, &tq)) != MP_OKAY)) {
1605 goto LBL_ERR;
1606 }
1607
1608 while (n-- >= 0) {
1609 if (mp_cmp(&tb, &ta) != MP_GT) {
1610 if (((res = mp_sub(&ta, &tb, &ta)) != MP_OKAY) ||
1611 ((res = mp_add(&q, &tq, &q)) != MP_OKAY)) {
1612 goto LBL_ERR;
1613 }
1614 }
1615 if (((res = mp_div_2d(&tb, 1, &tb, NULL)) != MP_OKAY) ||
1616 ((res = mp_div_2d(&tq, 1, &tq, NULL)) != MP_OKAY)) {
1617 goto LBL_ERR;
1618 }
1619 }
1620
1621 /* now q == quotient and ta == remainder */
1622 n = a->sign;
1623 n2 = (a->sign == b->sign ? MP_ZPOS : MP_NEG);
1624 if (c != NULL) {
1625 mp_exch(c, &q);
1626 c->sign = (mp_iszero(c) == MP_YES) ? MP_ZPOS : n2;
1627 }
1628 if (d != NULL) {
1629 mp_exch(d, &ta);
1630 d->sign = (mp_iszero(d) == MP_YES) ? MP_ZPOS : n;
1631 }
1632LBL_ERR:
1633 mp_clear(&ta);
1634 mp_clear(&tb);
1635 mp_clear(&tq);
1636 mp_clear(&q);
1637 return res;
1638}
1639
1640
1641/* b = a/2 */
1642int mp_div_2(mp_int * a, mp_int * b)
1643{
1644 int x, res, oldused;
1645
1646 /* copy */
1647 if (b->alloc < a->used) {
1648 if ((res = mp_grow (b, a->used)) != MP_OKAY) {
1649 return res;
1650 }
1651 }
1652
1653 oldused = b->used;
1654 b->used = a->used;
1655 {
1656 mp_digit r, rr, *tmpa, *tmpb;
1657
1658 /* source alias */
1659 tmpa = a->dp + b->used - 1;
1660
1661 /* dest alias */
1662 tmpb = b->dp + b->used - 1;
1663
1664 /* carry */
1665 r = 0;
1666 for (x = b->used - 1; x >= 0; x--) {
1667 /* get the carry for the next iteration */
1668 rr = *tmpa & 1;
1669
1670 /* shift the current digit, add in carry and store */
1671 *tmpb-- = (*tmpa-- >> 1) | (r << (DIGIT_BIT - 1));
1672
1673 /* forward carry to next iteration */
1674 r = rr;
1675 }
1676
1677 /* zero excess digits */
1678 tmpb = b->dp + b->used;
1679 for (x = b->used; x < oldused; x++) {
1680 *tmpb++ = 0;
1681 }
1682 }
1683 b->sign = a->sign;
1684 mp_clamp (b);
1685 return MP_OKAY;
1686}
1687
1688/* c = a / 2 (mod b) - constant time (a < b and positive) */
1689int mp_div_2_mod_ct(mp_int *a, mp_int *b, mp_int *c)
1690{
1691 int res;
1692
1693 if (mp_isodd(a)) {
1694 res = mp_add(a, b, c);
1695 if (res == MP_OKAY) {
1696 res = mp_div_2(c, c);
1697 }
1698 }
1699 else {
1700 res = mp_div_2(a, c);
1701 }
1702
1703 return res;
1704}
1705
1706
1707/* high level addition (handles signs) */
1708int mp_add (mp_int * a, mp_int * b, mp_int * c)
1709{
1710 int sa, sb, res;
1711
1712 /* get sign of both inputs */
1713 sa = a->sign;
1714 sb = b->sign;
1715
1716 /* handle two cases, not four */
1717 if (sa == sb) {
1718 /* both positive or both negative */
1719 /* add their magnitudes, copy the sign */
1720 c->sign = sa;
1721 res = s_mp_add (a, b, c);
1722 } else {
1723 /* one positive, the other negative */
1724 /* subtract the one with the greater magnitude from */
1725 /* the one of the lesser magnitude. The result gets */
1726 /* the sign of the one with the greater magnitude. */
1727 if (mp_cmp_mag (a, b) == MP_LT) {
1728 c->sign = sb;
1729 res = s_mp_sub (b, a, c);
1730 } else {
1731 c->sign = sa;
1732 res = s_mp_sub (a, b, c);
1733 }
1734 }
1735 return res;
1736}
1737
1738
1739/* low level addition, based on HAC pp.594, Algorithm 14.7 */
1740int s_mp_add (mp_int * a, mp_int * b, mp_int * c)
1741{
1742 mp_int *x;
1743 int olduse, res, min_ab, max_ab;
1744
1745 /* find sizes, we let |a| <= |b| which means we have to sort
1746 * them. "x" will point to the input with the most digits
1747 */
1748 if (a->used > b->used) {
1749 min_ab = b->used;
1750 max_ab = a->used;
1751 x = a;
1752 } else {
1753 min_ab = a->used;
1754 max_ab = b->used;
1755 x = b;
1756 }
1757
1758 /* init result */
1759 if (c->dp == NULL || c->alloc < max_ab + 1) {
1760 if ((res = mp_grow (c, max_ab + 1)) != MP_OKAY) {
1761 return res;
1762 }
1763 }
1764
1765 /* get old used digit count and set new one */
1766 olduse = c->used;
1767 c->used = max_ab + 1;
1768
1769 {
1770 mp_digit u, *tmpa, *tmpb, *tmpc;
1771 int i;
1772
1773 /* alias for digit pointers */
1774
1775 /* first input */
1776 tmpa = a->dp;
1777
1778 /* second input */
1779 tmpb = b->dp;
1780
1781 /* destination */
1782 tmpc = c->dp;
1783
1784 /* sanity-check dp pointers. */
1785 if ((min_ab > 0) &&
1786 ((tmpa == NULL) || (tmpb == NULL) || (tmpc == NULL)))
1787 {
1788 return MP_VAL;
1789 }
1790
1791 /* zero the carry */
1792 u = 0;
1793 for (i = 0; i < min_ab; i++) {
1794 /* Compute the sum at one digit, T[i] = A[i] + B[i] + U */
1795 *tmpc = *tmpa++ + *tmpb++ + u;
1796
1797 /* U = carry bit of T[i] */
1798 u = *tmpc >> ((mp_digit)DIGIT_BIT);
1799
1800 /* take away carry bit from T[i] */
1801 *tmpc++ &= MP_MASK;
1802 }
1803
1804 /* now copy higher words if any, that is in A+B
1805 * if A or B has more digits add those in
1806 */
1807 if (min_ab != max_ab) {
1808 for (; i < max_ab; i++) {
1809 /* T[i] = X[i] + U */
1810 *tmpc = x->dp[i] + u;
1811
1812 /* U = carry bit of T[i] */
1813 u = *tmpc >> ((mp_digit)DIGIT_BIT);
1814
1815 /* take away carry bit from T[i] */
1816 *tmpc++ &= MP_MASK;
1817 }
1818 }
1819
1820 /* add carry */
1821 *tmpc++ = u;
1822
1823 /* clear digits above olduse */
1824 for (i = c->used; i < olduse; i++) {
1825 *tmpc++ = 0;
1826 }
1827 }
1828
1829 mp_clamp (c);
1830 return MP_OKAY;
1831}
1832
1833
1834/* low level subtraction (assumes |a| > |b|), HAC pp.595 Algorithm 14.9 */
1835int s_mp_sub (mp_int * a, mp_int * b, mp_int * c)
1836{
1837 int olduse, res, min_b, max_a;
1838
1839 /* find sizes */
1840 min_b = b->used;
1841 max_a = a->used;
1842
1843 /* init result */
1844 if (c->alloc < max_a) {
1845 if ((res = mp_grow (c, max_a)) != MP_OKAY) {
1846 return res;
1847 }
1848 }
1849
1850 /* sanity check on destination */
1851 if (c->dp == NULL)
1852 return MP_VAL;
1853
1854 olduse = c->used;
1855 c->used = max_a;
1856
1857 {
1858 mp_digit u, *tmpa, *tmpb, *tmpc;
1859 int i;
1860
1861 /* alias for digit pointers */
1862 tmpa = a->dp;
1863 tmpb = b->dp;
1864 tmpc = c->dp;
1865
1866 /* sanity-check dp pointers from a and b. */
1867 if ((min_b > 0) &&
1868 ((tmpa == NULL) || (tmpb == NULL)))
1869 {
1870 return MP_VAL;
1871 }
1872
1873 /* set carry to zero */
1874 u = 0;
1875 for (i = 0; i < min_b; i++) {
1876 /* T[i] = A[i] - B[i] - U */
1877 *tmpc = *tmpa++ - *tmpb++ - u;
1878
1879 /* U = carry bit of T[i]
1880 * Note this saves performing an AND operation since
1881 * if a carry does occur it will propagate all the way to the
1882 * MSB. As a result a single shift is enough to get the carry
1883 */
1884 u = *tmpc >> ((mp_digit)(CHAR_BIT * sizeof (mp_digit) - 1));
1885
1886 /* Clear carry from T[i] */
1887 *tmpc++ &= MP_MASK;
1888 }
1889
1890 /* now copy higher words if any, e.g. if A has more digits than B */
1891 for (; i < max_a; i++) {
1892 /* T[i] = A[i] - U */
1893 *tmpc = *tmpa++ - u;
1894
1895 /* U = carry bit of T[i] */
1896 u = *tmpc >> ((mp_digit)(CHAR_BIT * sizeof (mp_digit) - 1));
1897
1898 /* Clear carry from T[i] */
1899 *tmpc++ &= MP_MASK;
1900 }
1901
1902 /* clear digits above used (since we may not have grown result above) */
1903 for (i = c->used; i < olduse; i++) {
1904 *tmpc++ = 0;
1905 }
1906 }
1907
1908 mp_clamp (c);
1909 return MP_OKAY;
1910}
1911
1912
1913/* high level subtraction (handles signs) */
1914int mp_sub (mp_int * a, mp_int * b, mp_int * c)
1915{
1916 int sa, sb, res;
1917
1918 sa = a->sign;
1919 sb = b->sign;
1920
1921 if (sa != sb) {
1922 /* subtract a negative from a positive, OR */
1923 /* subtract a positive from a negative. */
1924 /* In either case, ADD their magnitudes, */
1925 /* and use the sign of the first number. */
1926 c->sign = sa;
1927 res = s_mp_add (a, b, c);
1928 } else {
1929 /* subtract a positive from a positive, OR */
1930 /* subtract a negative from a negative. */
1931 /* First, take the difference between their */
1932 /* magnitudes, then... */
1933 if (mp_cmp_mag (a, b) != MP_LT) {
1934 /* Copy the sign from the first */
1935 c->sign = sa;
1936 /* The first has a larger or equal magnitude */
1937 res = s_mp_sub (a, b, c);
1938 } else {
1939 /* The result has the *opposite* sign from */
1940 /* the first number. */
1941 c->sign = (sa == MP_ZPOS) ? MP_NEG : MP_ZPOS;
1942 /* The second has a larger magnitude */
1943 res = s_mp_sub (b, a, c);
1944 }
1945 }
1946 return res;
1947}
1948
1949
1950/* determines if reduce_2k_l can be used */
1951int mp_reduce_is_2k_l(mp_int *a)
1952{
1953 int ix, iy;
1954
1955 if (a->used == 0) {
1956 return MP_NO;
1957 } else if (a->used == 1) {
1958 return MP_YES;
1959 } else if (a->used > 1) {
1960 /* if more than half of the digits are -1 we're sold */
1961 for (iy = ix = 0; ix < a->used; ix++) {
1962 if (a->dp[ix] == MP_MASK) {
1963 ++iy;
1964 }
1965 }
1966 return (iy >= (a->used/2)) ? MP_YES : MP_NO;
1967
1968 }
1969 return MP_NO;
1970}
1971
1972
1973/* determines if mp_reduce_2k can be used */
1974int mp_reduce_is_2k(mp_int *a)
1975{
1976 int ix, iy, iw;
1977 mp_digit iz;
1978
1979 if (a->used == 0) {
1980 return MP_NO;
1981 } else if (a->used == 1) {
1982 return MP_YES;
1983 } else if (a->used > 1) {
1984 iy = mp_count_bits(a);
1985 iz = 1;
1986 iw = 1;
1987
1988 /* Test every bit from the second digit up, must be 1 */
1989 for (ix = DIGIT_BIT; ix < iy; ix++) {
1990 if ((a->dp[iw] & iz) == 0) {
1991 return MP_NO;
1992 }
1993 iz <<= 1;
1994 if (iz > (mp_digit)MP_MASK) {
1995 ++iw;
1996 iz = 1;
1997 }
1998 }
1999 }
2000 return MP_YES;
2001}
2002
2003
2004/* determines if a number is a valid DR modulus */
2005int mp_dr_is_modulus(mp_int *a)
2006{
2007 int ix;
2008
2009 /* must be at least two digits */
2010 if (a->used < 2) {
2011 return 0;
2012 }
2013
2014 /* must be of the form b**k - a [a <= b] so all
2015 * but the first digit must be equal to -1 (mod b).
2016 */
2017 for (ix = 1; ix < a->used; ix++) {
2018 if (a->dp[ix] != MP_MASK) {
2019 return 0;
2020 }
2021 }
2022 return 1;
2023}
2024
2025/* computes Y == G**X mod P, HAC pp.616, Algorithm 14.85
2026 *
2027 * Uses a left-to-right k-ary sliding window to compute the modular
2028 * exponentiation.
2029 * The value of k changes based on the size of the exponent.
2030 *
2031 * Uses Montgomery or Diminished Radix reduction [whichever appropriate]
2032 */
2033
2034#ifdef MP_LOW_MEM
2035 #define TAB_SIZE 32
2036#else
2037 #define TAB_SIZE 256
2038#endif
2039
2040int mp_exptmod_fast (mp_int * G, mp_int * X, mp_int * P, mp_int * Y,
2041 int redmode)
2042{
2043 mp_int res;
2044 mp_digit buf, mp;
2045 int err, bitbuf, bitcpy, bitcnt, mode, digidx, x, y, winsize;
2046 WC_DECLARE_VAR(M, mp_int, TAB_SIZE, 0);
2047 /* use a pointer to the reduction algorithm. This allows us to use
2048 * one of many reduction algorithms without modding the guts of
2049 * the code with if statements everywhere.
2050 */
2051 int (*redux)(mp_int*,mp_int*,mp_digit) = NULL;
2052
2053 WC_ALLOC_VAR_EX(M, mp_int, TAB_SIZE, NULL, DYNAMIC_TYPE_BIGINT,
2054 return MP_MEM);
2055
2056 /* find window size */
2057 x = mp_count_bits (X);
2058 if (x <= 7) {
2059 winsize = 2;
2060 } else if (x <= 36) {
2061 winsize = 3;
2062 } else if (x <= 140) {
2063 winsize = 4;
2064 } else if (x <= 450) {
2065 winsize = 5;
2066 } else if (x <= 1303) {
2067 winsize = 6;
2068 } else if (x <= 3529) {
2069 winsize = 7;
2070 } else {
2071 winsize = 8;
2072 }
2073
2074#ifdef MP_LOW_MEM
2075 if (winsize > 5) {
2076 winsize = 5;
2077 }
2078#endif
2079
2080 /* init M array */
2081 /* init first cell */
2082 if ((err = mp_init_size(&M[1], P->alloc)) != MP_OKAY) {
2083 WC_FREE_VAR_EX(M, NULL, DYNAMIC_TYPE_BIGINT);
2084
2085 return err;
2086 }
2087
2088 /* now init the second half of the array */
2089 for (x = 1<<(winsize-1); x < (1 << winsize); x++) {
2090 if ((err = mp_init_size(&M[x], P->alloc)) != MP_OKAY) {
2091 for (y = 1<<(winsize-1); y < x; y++) {
2092 mp_clear (&M[y]);
2093 }
2094 mp_clear(&M[1]);
2095
2096 WC_FREE_VAR_EX(M, NULL, DYNAMIC_TYPE_BIGINT);
2097
2098 return err;
2099 }
2100 }
2101
2102 /* determine and setup reduction code */
2103 if (redmode == 0) {
2104#ifdef BN_MP_MONTGOMERY_SETUP_C
2105 /* now setup montgomery */
2106 if ((err = mp_montgomery_setup (P, &mp)) != MP_OKAY) {
2107 goto LBL_M;
2108 }
2109#else
2110 err = MP_VAL;
2111 goto LBL_M;
2112#endif
2113
2114 /* automatically pick the comba one if available (saves quite a few
2115 calls/ifs) */
2116#ifdef BN_FAST_MP_MONTGOMERY_REDUCE_C
2117 if (((P->used * 2 + 1) < (int)MP_WARRAY) &&
2118 P->used < (1L << ((CHAR_BIT * sizeof (mp_word)) - (2 * DIGIT_BIT)))) {
2119 redux = fast_mp_montgomery_reduce;
2120 } else
2121#endif
2122 {
2123#ifdef BN_MP_MONTGOMERY_REDUCE_C
2124 /* use slower baseline Montgomery method */
2125 redux = mp_montgomery_reduce;
2126#endif
2127 }
2128 } else if (redmode == 1) {
2129#if defined(BN_MP_DR_SETUP_C) && defined(BN_MP_DR_REDUCE_C)
2130 /* setup DR reduction for moduli of the form B**k - b */
2131 mp_dr_setup(P, &mp);
2132 redux = mp_dr_reduce;
2133#endif
2134 } else {
2135#if defined(BN_MP_REDUCE_2K_SETUP_C) && defined(BN_MP_REDUCE_2K_C)
2136 /* setup DR reduction for moduli of the form 2**k - b */
2137 if ((err = mp_reduce_2k_setup(P, &mp)) != MP_OKAY) {
2138 goto LBL_M;
2139 }
2140 /* mp of zero is not usable */
2141 if (mp != 0) {
2142 redux = mp_reduce_2k;
2143 }
2144#endif
2145 }
2146
2147 if (redux == NULL) {
2148 err = MP_VAL;
2149 goto LBL_M;
2150 }
2151
2152 /* setup result */
2153 if ((err = mp_init_size (&res, P->alloc)) != MP_OKAY) {
2154 goto LBL_M;
2155 }
2156
2157 /* create M table
2158 *
2159
2160 *
2161 * The first half of the table is not computed though accept for M[0] and M[1]
2162 */
2163
2164 if (redmode == 0) {
2165#ifdef BN_MP_MONTGOMERY_CALC_NORMALIZATION_C
2166 /* now we need R mod m */
2167 if ((err = mp_montgomery_calc_normalization (&res, P)) != MP_OKAY) {
2168 goto LBL_RES;
2169 }
2170
2171 /* now set M[1] to G * R mod m */
2172 if ((err = mp_mulmod (G, &res, P, &M[1])) != MP_OKAY) {
2173 goto LBL_RES;
2174 }
2175#else
2176 err = MP_VAL;
2177 goto LBL_RES;
2178#endif
2179 } else {
2180 if ((err = mp_set(&res, 1)) != MP_OKAY) {
2181 goto LBL_RES;
2182 }
2183 if ((err = mp_mod(G, P, &M[1])) != MP_OKAY) {
2184 goto LBL_RES;
2185 }
2186 }
2187
2188 /* compute the value at M[1<<(winsize-1)] by squaring M[1] (winsize-1) times*/
2189 if ((err = mp_copy (&M[1], &M[(mp_digit)(1 << (winsize - 1))])) != MP_OKAY) {
2190 goto LBL_RES;
2191 }
2192
2193 for (x = 0; x < (winsize - 1); x++) {
2194 if ((err = mp_sqr (&M[(mp_digit)(1 << (winsize - 1))],
2195 &M[(mp_digit)(1 << (winsize - 1))])) != MP_OKAY) {
2196 goto LBL_RES;
2197 }
2198 if ((err = redux (&M[(mp_digit)(1 << (winsize - 1))], P, mp)) != MP_OKAY) {
2199 goto LBL_RES;
2200 }
2201 }
2202
2203 /* create upper table */
2204 for (x = (1 << (winsize - 1)) + 1; x < (1 << winsize); x++) {
2205 if ((err = mp_mul (&M[x - 1], &M[1], &M[x])) != MP_OKAY) {
2206 goto LBL_RES;
2207 }
2208 if ((err = redux (&M[x], P, mp)) != MP_OKAY) {
2209 goto LBL_RES;
2210 }
2211 }
2212
2213 /* set initial mode and bit cnt */
2214 mode = 0;
2215 bitcnt = 1;
2216 buf = 0;
2217 digidx = X->used - 1;
2218 bitcpy = 0;
2219 bitbuf = 0;
2220
2221 for (;;) {
2222 /* grab next digit as required */
2223 if (--bitcnt == 0) {
2224 /* if digidx == -1 we are out of digits so break */
2225 if (digidx == -1) {
2226 break;
2227 }
2228 /* read next digit and reset bitcnt */
2229 buf = X->dp[digidx--];
2230 bitcnt = (int)DIGIT_BIT;
2231 }
2232
2233 /* grab the next msb from the exponent */
2234 y = (int)(buf >> (DIGIT_BIT - 1)) & 1;
2235 buf <<= (mp_digit)1;
2236
2237 /* if the bit is zero and mode == 0 then we ignore it
2238 * These represent the leading zero bits before the first 1 bit
2239 * in the exponent. Technically this opt is not required but it
2240 * does lower the # of trivial squaring/reductions used
2241 */
2242 if (mode == 0 && y == 0) {
2243 continue;
2244 }
2245
2246 /* if the bit is zero and mode == 1 then we square */
2247 if (mode == 1 && y == 0) {
2248 if ((err = mp_sqr (&res, &res)) != MP_OKAY) {
2249 goto LBL_RES;
2250 }
2251 if ((err = redux (&res, P, mp)) != MP_OKAY) {
2252 goto LBL_RES;
2253 }
2254 continue;
2255 }
2256
2257 /* else we add it to the window */
2258 bitbuf |= (y << (winsize - ++bitcpy));
2259 mode = 2;
2260
2261 if (bitcpy == winsize) {
2262 /* ok window is filled so square as required and multiply */
2263 /* square first */
2264 for (x = 0; x < winsize; x++) {
2265 if ((err = mp_sqr (&res, &res)) != MP_OKAY) {
2266 goto LBL_RES;
2267 }
2268 if ((err = redux (&res, P, mp)) != MP_OKAY) {
2269 goto LBL_RES;
2270 }
2271 }
2272
2273 /* then multiply */
2274 if ((err = mp_mul (&res, &M[bitbuf], &res)) != MP_OKAY) {
2275 goto LBL_RES;
2276 }
2277 if ((err = redux (&res, P, mp)) != MP_OKAY) {
2278 goto LBL_RES;
2279 }
2280
2281 /* empty window and reset */
2282 bitcpy = 0;
2283 bitbuf = 0;
2284 mode = 1;
2285 }
2286 }
2287
2288 /* if bits remain then square/multiply */
2289 if (mode == 2 && bitcpy > 0) {
2290 /* square then multiply if the bit is set */
2291 for (x = 0; x < bitcpy; x++) {
2292 if ((err = mp_sqr (&res, &res)) != MP_OKAY) {
2293 goto LBL_RES;
2294 }
2295 if ((err = redux (&res, P, mp)) != MP_OKAY) {
2296 goto LBL_RES;
2297 }
2298
2299 /* get next bit of the window */
2300 bitbuf <<= 1;
2301 if ((bitbuf & (1 << winsize)) != 0) {
2302 /* then multiply */
2303 if ((err = mp_mul (&res, &M[1], &res)) != MP_OKAY) {
2304 goto LBL_RES;
2305 }
2306 if ((err = redux (&res, P, mp)) != MP_OKAY) {
2307 goto LBL_RES;
2308 }
2309 }
2310 }
2311 }
2312
2313 if (redmode == 0) {
2314 /* fixup result if Montgomery reduction is used
2315 * recall that any value in a Montgomery system is
2316 * actually multiplied by R mod n. So we have
2317 * to reduce one more time to cancel out the factor
2318 * of R.
2319 */
2320 if ((err = redux(&res, P, mp)) != MP_OKAY) {
2321 goto LBL_RES;
2322 }
2323 }
2324
2325 /* swap res with Y */
2326 mp_exch (&res, Y);
2327 err = MP_OKAY;
2328LBL_RES:mp_clear (&res);
2329LBL_M:
2330 mp_clear(&M[1]);
2331 for (x = 1<<(winsize-1); x < (1 << winsize); x++) {
2332 mp_clear (&M[x]);
2333 }
2334
2335 WC_FREE_VAR_EX(M, NULL, DYNAMIC_TYPE_BIGINT);
2336
2337 return err;
2338}
2339
2340#ifdef BN_MP_EXPTMOD_BASE_2
2341#if DIGIT_BIT < 16
2342 #define WINSIZE 3
2343#elif DIGIT_BIT < 32
2344 #define WINSIZE 4
2345#elif DIGIT_BIT < 64
2346 #define WINSIZE 5
2347#elif DIGIT_BIT < 128
2348 #define WINSIZE 6
2349#endif
2350int mp_exptmod_base_2(mp_int * X, mp_int * P, mp_int * Y)
2351{
2352 mp_digit buf, mp;
2353 int err = MP_OKAY, bitbuf, bitcpy, bitcnt, digidx, x, y;
2354 mp_int res[1];
2355 int (*redux)(mp_int*,mp_int*,mp_digit) = NULL;
2356
2357 /* automatically pick the comba one if available (saves quite a few
2358 calls/ifs) */
2359#ifdef BN_FAST_MP_MONTGOMERY_REDUCE_C
2360 if (((P->used * 2 + 1) < (int)MP_WARRAY) &&
2361 P->used < (1L << ((CHAR_BIT * sizeof (mp_word)) - (2 * DIGIT_BIT)))) {
2362 redux = fast_mp_montgomery_reduce;
2363 } else
2364#endif
2365#ifdef BN_MP_MONTGOMERY_REDUCE_C
2366 {
2367 /* use slower baseline Montgomery method */
2368 redux = mp_montgomery_reduce;
2369 }
2370#endif
2371
2372 if (redux == NULL) {
2373 return MP_VAL;
2374 }
2375
2376 /* now setup montgomery */
2377 if ((err = mp_montgomery_setup(P, &mp)) != MP_OKAY) {
2378 goto LBL_M;
2379 }
2380
2381 /* setup result */
2382 if ((err = mp_init(res)) != MP_OKAY) {
2383 goto LBL_M;
2384 }
2385
2386 /* now we need R mod m */
2387 if ((err = mp_montgomery_calc_normalization(res, P)) != MP_OKAY) {
2388 goto LBL_RES;
2389 }
2390
2391 /* Get the top bits left over after taking WINSIZE bits starting at the
2392 * least-significant.
2393 */
2394 digidx = X->used - 1;
2395 bitcpy = (X->used * DIGIT_BIT) % WINSIZE;
2396 if (bitcpy > 0) {
2397 bitcnt = (int)DIGIT_BIT - bitcpy;
2398 buf = X->dp[digidx--];
2399 bitbuf = (int)(buf >> bitcnt);
2400 /* Multiply montgomery representation of 1 by 2 ^ top */
2401 err = mp_mul_2d(res, bitbuf, res);
2402 if (err != MP_OKAY) {
2403 goto LBL_RES;
2404 }
2405 err = mp_mod(res, P, res);
2406 if (err != MP_OKAY) {
2407 goto LBL_RES;
2408 }
2409 /* Move out bits used */
2410 buf <<= bitcpy;
2411 bitcnt++;
2412 }
2413 else {
2414 bitcnt = 1;
2415 buf = 0;
2416 }
2417
2418 /* empty window and reset */
2419 bitbuf = 0;
2420 bitcpy = 0;
2421
2422 for (;;) {
2423 /* grab next digit as required */
2424 if (--bitcnt == 0) {
2425 /* if digidx == -1 we are out of digits so break */
2426 if (digidx == -1) {
2427 break;
2428 }
2429 /* read next digit and reset bitcnt */
2430 buf = X->dp[digidx--];
2431 bitcnt = (int)DIGIT_BIT;
2432 }
2433
2434 /* grab the next msb from the exponent */
2435 y = (int)(buf >> (DIGIT_BIT - 1)) & 1;
2436 buf <<= (mp_digit)1;
2437 /* add bit to the window */
2438 bitbuf |= (y << (WINSIZE - ++bitcpy));
2439
2440 if (bitcpy == WINSIZE) {
2441 /* ok window is filled so square as required and multiply */
2442 /* square first */
2443 for (x = 0; x < WINSIZE; x++) {
2444 err = mp_sqr(res, res);
2445 if (err != MP_OKAY) {
2446 goto LBL_RES;
2447 }
2448 err = (*redux)(res, P, mp);
2449 if (err != MP_OKAY) {
2450 goto LBL_RES;
2451 }
2452 }
2453
2454 /* then multiply by 2^bitbuf */
2455 err = mp_mul_2d(res, bitbuf, res);
2456 if (err != MP_OKAY) {
2457 goto LBL_RES;
2458 }
2459 err = mp_mod(res, P, res);
2460 if (err != MP_OKAY) {
2461 goto LBL_RES;
2462 }
2463
2464 /* empty window and reset */
2465 bitcpy = 0;
2466 bitbuf = 0;
2467 }
2468 }
2469
2470 /* fixup result if Montgomery reduction is used
2471 * recall that any value in a Montgomery system is
2472 * actually multiplied by R mod n. So we have
2473 * to reduce one more time to cancel out the factor
2474 * of R.
2475 */
2476 err = (*redux)(res, P, mp);
2477 if (err != MP_OKAY) {
2478 goto LBL_RES;
2479 }
2480
2481 /* swap res with Y */
2482 err = mp_copy(res, Y);
2483
2484LBL_RES:mp_clear (res);
2485LBL_M:
2486 return err;
2487}
2488
2489#undef WINSIZE
2490#endif /* BN_MP_EXPTMOD_BASE_2 */
2491
2492
2493/* setups the montgomery reduction stuff */
2494int mp_montgomery_setup (mp_int * n, mp_digit * rho)
2495{
2496 mp_digit x, b;
2497
2498/* fast inversion mod 2**k
2499 *
2500 * Based on the fact that
2501 *
2502 * XA = 1 (mod 2**n) => (X(2-XA)) A = 1 (mod 2**2n)
2503 * => 2*X*A - X*X*A*A = 1
2504 * => 2*(1) - (1) = 1
2505 */
2506 b = n->dp[0];
2507
2508 if ((b & 1) == 0) {
2509 return MP_VAL;
2510 }
2511
2512 x = (((b + 2) & 4) << 1) + b; /* here x*a==1 mod 2**4 */
2513 x *= 2 - b * x; /* here x*a==1 mod 2**8 */
2514#if !defined(MP_8BIT)
2515 x *= 2 - b * x; /* here x*a==1 mod 2**16 */
2516#endif
2517#if defined(MP_64BIT) || !(defined(MP_8BIT) || defined(MP_16BIT))
2518 x *= 2 - b * x; /* here x*a==1 mod 2**32 */
2519#endif
2520#ifdef MP_64BIT
2521 x *= 2 - b * x; /* here x*a==1 mod 2**64 */
2522#endif
2523
2524 /* rho = -1/m mod b */
2525 /* TAO, switched mp_word casts to mp_digit to shut up compiler */
2526 *rho = (mp_digit)((((mp_digit)1 << ((mp_digit) DIGIT_BIT)) - x) & MP_MASK);
2527
2528 return MP_OKAY;
2529}
2530
2531
2532/* computes xR**-1 == x (mod N) via Montgomery Reduction
2533 *
2534 * This is an optimized implementation of montgomery_reduce
2535 * which uses the comba method to quickly calculate the columns of the
2536 * reduction.
2537 *
2538 * Based on Algorithm 14.32 on pp.601 of HAC.
2539*/
2540int fast_mp_montgomery_reduce (mp_int * x, mp_int * n, mp_digit rho)
2541{
2542 int ix, res, olduse;
2543 /* uses dynamic memory and slower */
2544 WC_DECLARE_VAR(W, mp_word, MP_WARRAY, 0);
2545
2546 /* get old used count */
2547 olduse = x->used;
2548
2549 /* grow a as required */
2550 if (x->alloc < n->used + 1) {
2551 if ((res = mp_grow (x, n->used + 1)) != MP_OKAY) {
2552 return res;
2553 }
2554 }
2555
2556 WC_ALLOC_VAR_EX(W, mp_word, (n->used*2+2), NULL, DYNAMIC_TYPE_BIGINT,
2557 return MP_MEM);
2558
2559 XMEMSET(W, 0, sizeof(mp_word) * (n->used * 2 + 2));
2560
2561 /* first we have to get the digits of the input into
2562 * an array of double precision words W[...]
2563 */
2564 {
2565 mp_word *_W;
2566 mp_digit *tmpx;
2567
2568 /* alias for the W[] array */
2569 _W = W;
2570
2571 /* alias for the digits of x*/
2572 tmpx = x->dp;
2573
2574 /* copy the digits of a into W[0..a->used-1] */
2575 for (ix = 0; ix < x->used; ix++) {
2576 *_W++ = *tmpx++;
2577 }
2578 }
2579
2580 /* now we proceed to zero successive digits
2581 * from the least significant upwards
2582 */
2583 for (ix = 0; ix < n->used; ix++) {
2584 /* mu = ai * m' mod b
2585 *
2586 * We avoid a double precision multiplication (which isn't required)
2587 * by casting the value down to a mp_digit. Note this requires
2588 * that W[ix-1] have the carry cleared (see after the inner loop)
2589 */
2590 mp_digit mu;
2591 mu = (mp_digit) (((W[ix] & MP_MASK) * rho) & MP_MASK);
2592
2593 /* a = a + mu * m * b**i
2594 *
2595 * This is computed in place and on the fly. The multiplication
2596 * by b**i is handled by offsetting which columns the results
2597 * are added to.
2598 *
2599 * Note the comba method normally doesn't handle carries in the
2600 * inner loop In this case we fix the carry from the previous
2601 * column since the Montgomery reduction requires digits of the
2602 * result (so far) [see above] to work. This is
2603 * handled by fixing up one carry after the inner loop. The
2604 * carry fixups are done in order so after these loops the
2605 * first m->used words of W[] have the carries fixed
2606 */
2607 {
2608 int iy;
2609 mp_digit *tmpn;
2610 mp_word *_W;
2611
2612 /* alias for the digits of the modulus */
2613 tmpn = n->dp;
2614
2615 /* Alias for the columns set by an offset of ix */
2616 _W = W + ix;
2617
2618 /* inner loop */
2619 for (iy = 0; iy < n->used; iy++) {
2620 *_W++ += ((mp_word)mu) * ((mp_word)*tmpn++);
2621 }
2622 }
2623
2624 /* now fix carry for next digit, W[ix+1] */
2625 W[ix + 1] += W[ix] >> ((mp_word) DIGIT_BIT);
2626 }
2627
2628 /* now we have to propagate the carries and
2629 * shift the words downward [all those least
2630 * significant digits we zeroed].
2631 */
2632 {
2633 mp_digit *tmpx;
2634 mp_word *_W, *_W1;
2635
2636 /* nox fix rest of carries */
2637
2638 /* alias for current word */
2639 _W1 = W + ix;
2640
2641 /* alias for next word, where the carry goes */
2642 _W = W + ++ix;
2643
2644 for (; ix <= n->used * 2 + 1; ix++) {
2645 *_W++ += *_W1++ >> ((mp_word) DIGIT_BIT);
2646 }
2647
2648 /* copy out, A = A/b**n
2649 *
2650 * The result is A/b**n but instead of converting from an
2651 * array of mp_word to mp_digit than calling mp_rshd
2652 * we just copy them in the right order
2653 */
2654
2655 /* alias for destination word */
2656 tmpx = x->dp;
2657
2658 /* alias for shifted double precision result */
2659 _W = W + n->used;
2660
2661 for (ix = 0; ix < n->used + 1; ix++) {
2662 *tmpx++ = (mp_digit)(*_W++ & ((mp_word) MP_MASK));
2663 }
2664
2665 /* zero olduse digits, if the input a was larger than
2666 * m->used+1 we'll have to clear the digits
2667 */
2668 for (; ix < olduse; ix++) {
2669 *tmpx++ = 0;
2670 }
2671 }
2672
2673 /* set the max used and clamp */
2674 x->used = n->used + 1;
2675 mp_clamp (x);
2676
2677 WC_FREE_VAR_EX(W, NULL, DYNAMIC_TYPE_BIGINT);
2678
2679 /* if A >= m then A = A - m */
2680 if (mp_cmp_mag (x, n) != MP_LT) {
2681 return s_mp_sub (x, n, x);
2682 }
2683 return MP_OKAY;
2684}
2685
2686
2687/* computes xR**-1 == x (mod N) via Montgomery Reduction */
2688int mp_montgomery_reduce (mp_int * x, mp_int * n, mp_digit rho)
2689{
2690 int ix, res, digs;
2691 mp_digit mu;
2692
2693 /* can the fast reduction [comba] method be used?
2694 *
2695 * Note that unlike in mul you're safely allowed *less*
2696 * than the available columns [255 per default] since carries
2697 * are fixed up in the inner loop.
2698 */
2699 digs = n->used * 2 + 1;
2700 if ((digs < (int)MP_WARRAY) &&
2701 n->used <
2702 (1L << ((CHAR_BIT * sizeof (mp_word)) - (2 * DIGIT_BIT)))) {
2703 return fast_mp_montgomery_reduce (x, n, rho);
2704 }
2705
2706 /* grow the input as required */
2707 if (x->alloc < digs) {
2708 if ((res = mp_grow (x, digs)) != MP_OKAY) {
2709 return res;
2710 }
2711 }
2712 x->used = digs;
2713
2714 for (ix = 0; ix < n->used; ix++) {
2715 /* mu = ai * rho mod b
2716 *
2717 * The value of rho must be precalculated via
2718 * montgomery_setup() such that
2719 * it equals -1/n0 mod b this allows the
2720 * following inner loop to reduce the
2721 * input one digit at a time
2722 */
2723 mu = (mp_digit) (((mp_word)x->dp[ix]) * ((mp_word)rho) & MP_MASK);
2724
2725 /* a = a + mu * m * b**i */
2726 {
2727 int iy;
2728 mp_digit *tmpn, *tmpx, u;
2729 mp_word r;
2730
2731 /* alias for digits of the modulus */
2732 tmpn = n->dp;
2733
2734 /* alias for the digits of x [the input] */
2735 tmpx = x->dp + ix;
2736
2737 /* set the carry to zero */
2738 u = 0;
2739
2740 /* Multiply and add in place */
2741 for (iy = 0; iy < n->used; iy++) {
2742 /* compute product and sum */
2743 r = ((mp_word)mu) * ((mp_word)*tmpn++) +
2744 ((mp_word) u) + ((mp_word) * tmpx);
2745
2746 /* get carry */
2747 u = (mp_digit)(r >> ((mp_word) DIGIT_BIT));
2748
2749 /* fix digit */
2750 *tmpx++ = (mp_digit)(r & ((mp_word) MP_MASK));
2751 }
2752 /* At this point the ix'th digit of x should be zero */
2753
2754
2755 /* propagate carries upwards as required*/
2756 while (u) {
2757 *tmpx += u;
2758 u = *tmpx >> DIGIT_BIT;
2759 *tmpx++ &= MP_MASK;
2760 }
2761 }
2762 }
2763
2764 /* at this point the n.used'th least
2765 * significant digits of x are all zero
2766 * which means we can shift x to the
2767 * right by n.used digits and the
2768 * residue is unchanged.
2769 */
2770
2771 /* x = x/b**n.used */
2772 mp_clamp(x);
2773 mp_rshd (x, n->used);
2774
2775 /* if x >= n then x = x - n */
2776 if (mp_cmp_mag (x, n) != MP_LT) {
2777 return s_mp_sub (x, n, x);
2778 }
2779
2780 return MP_OKAY;
2781}
2782
2783
2784/* determines the setup value */
2785void mp_dr_setup(mp_int *a, mp_digit *d)
2786{
2787 /* the casts are required if DIGIT_BIT is one less than
2788 * the number of bits in a mp_digit [e.g. DIGIT_BIT==31]
2789 */
2790 *d = (mp_digit)((((mp_word)1) << ((mp_word)DIGIT_BIT)) -
2791 ((mp_word)a->dp[0]));
2792}
2793
2794
2795/* reduce "x" in place modulo "n" using the Diminished Radix algorithm.
2796 *
2797 * Based on algorithm from the paper
2798 *
2799 * "Generating Efficient Primes for Discrete Log Cryptosystems"
2800 * Chae Hoon Lim, Pil Joong Lee,
2801 * POSTECH Information Research Laboratories
2802 *
2803 * The modulus must be of a special format [see manual]
2804 *
2805 * Has been modified to use algorithm 7.10 from the LTM book instead
2806 *
2807 * Input x must be in the range 0 <= x <= (n-1)**2
2808 */
2809int mp_dr_reduce (mp_int * x, mp_int * n, mp_digit k)
2810{
2811 int err, i, m;
2812 mp_word r;
2813 mp_digit mu, *tmpx1, *tmpx2;
2814
2815 /* m = digits in modulus */
2816 m = n->used;
2817
2818 /* ensure that "x" has at least 2m digits */
2819 if (x->alloc < m + m) {
2820 if ((err = mp_grow (x, m + m)) != MP_OKAY) {
2821 return err;
2822 }
2823 }
2824
2825/* top of loop, this is where the code resumes if
2826 * another reduction pass is required.
2827 */
2828top:
2829 /* aliases for digits */
2830 /* alias for lower half of x */
2831 tmpx1 = x->dp;
2832
2833 /* alias for upper half of x, or x/B**m */
2834 tmpx2 = x->dp + m;
2835
2836 /* set carry to zero */
2837 mu = 0;
2838
2839 /* compute (x mod B**m) + k * [x/B**m] inline and inplace */
2840 for (i = 0; i < m; i++) {
2841 r = ((mp_word)*tmpx2++) * ((mp_word)k) + *tmpx1 + mu;
2842 *tmpx1++ = (mp_digit)(r & MP_MASK);
2843 mu = (mp_digit)(r >> ((mp_word)DIGIT_BIT));
2844 }
2845
2846 /* set final carry */
2847 *tmpx1++ = mu;
2848
2849 /* zero words above m */
2850 for (i = m + 1; i < x->used; i++) {
2851 *tmpx1++ = 0;
2852 }
2853
2854 /* clamp, sub and return */
2855 mp_clamp (x);
2856
2857 /* if x >= n then subtract and reduce again
2858 * Each successive "recursion" makes the input smaller and smaller.
2859 */
2860 if (mp_cmp_mag (x, n) != MP_LT) {
2861 if ((err = s_mp_sub(x, n, x)) != MP_OKAY) {
2862 return err;
2863 }
2864 goto top;
2865 }
2866 return MP_OKAY;
2867}
2868
2869
2870/* reduces a modulo n where n is of the form 2**p - d */
2871int mp_reduce_2k(mp_int *a, mp_int *n, mp_digit d)
2872{
2873 mp_int q;
2874 int p, res;
2875
2876 if ((res = mp_init(&q)) != MP_OKAY) {
2877 return res;
2878 }
2879
2880 p = mp_count_bits(n);
2881top:
2882 /* q = a/2**p, a = a mod 2**p */
2883 if ((res = mp_div_2d(a, p, &q, a)) != MP_OKAY) {
2884 goto ERR;
2885 }
2886
2887 if (d != 1) {
2888 /* q = q * d */
2889 if ((res = mp_mul_d(&q, d, &q)) != MP_OKAY) {
2890 goto ERR;
2891 }
2892 }
2893
2894 /* a = a + q */
2895 if ((res = s_mp_add(a, &q, a)) != MP_OKAY) {
2896 goto ERR;
2897 }
2898
2899 if (mp_cmp_mag(a, n) != MP_LT) {
2900 if ((res = s_mp_sub(a, n, a)) != MP_OKAY) {
2901 goto ERR;
2902 }
2903 goto top;
2904 }
2905
2906ERR:
2907 mp_clear(&q);
2908 return res;
2909}
2910
2911
2912/* determines the setup value */
2913int mp_reduce_2k_setup(mp_int *a, mp_digit *d)
2914{
2915 int res, p;
2916 mp_int tmp;
2917
2918 if ((res = mp_init(&tmp)) != MP_OKAY) {
2919 return res;
2920 }
2921
2922 p = mp_count_bits(a);
2923 if ((res = mp_2expt(&tmp, p)) != MP_OKAY) {
2924 mp_clear(&tmp);
2925 return res;
2926 }
2927
2928 if ((res = s_mp_sub(&tmp, a, &tmp)) != MP_OKAY) {
2929 mp_clear(&tmp);
2930 return res;
2931 }
2932
2933 *d = tmp.dp[0];
2934 mp_clear(&tmp);
2935 return MP_OKAY;
2936}
2937
2938
2939/* set the b bit of a */
2940int mp_set_bit (mp_int * a, int b)
2941{
2942 int i = b / DIGIT_BIT, res;
2943
2944 /*
2945 * Require:
2946 * bit index b >= 0
2947 * a->alloc == a->used == 0 if a->dp == NULL
2948 */
2949 if (b < 0 || (a->dp == NULL && (a->alloc != 0 || a->used != 0)))
2950 return MP_VAL;
2951
2952 if (a->dp == NULL || a->used < (int)(i + 1)) {
2953 /* grow a to accommodate the single bit */
2954 if ((res = mp_grow (a, i + 1)) != MP_OKAY) {
2955 return res;
2956 }
2957
2958 /* set the used count of where the bit will go */
2959 a->used = (int)(i + 1);
2960 }
2961
2962 /* put the single bit in its place */
2963 a->dp[i] |= ((mp_digit)1) << (b % DIGIT_BIT);
2964
2965 return MP_OKAY;
2966}
2967
2968/* computes a = 2**b
2969 *
2970 * Simple algorithm which zeros the int, set the required bit
2971 */
2972int mp_2expt (mp_int * a, int b)
2973{
2974 /* zero a as per default */
2975 mp_zero (a);
2976
2977 return mp_set_bit(a, b);
2978}
2979
2980/* multiply by a digit */
2981int mp_mul_d (mp_int * a, mp_digit b, mp_int * c)
2982{
2983 mp_digit u, *tmpa, *tmpc;
2984 mp_word r;
2985 int ix, res, olduse;
2986
2987 /* make sure c is big enough to hold a*b */
2988 if (c->dp == NULL || c->alloc < a->used + 1) {
2989 if ((res = mp_grow (c, a->used + 1)) != MP_OKAY) {
2990 return res;
2991 }
2992 }
2993
2994 /* get the original destinations used count */
2995 olduse = c->used;
2996
2997 /* set the sign */
2998 c->sign = a->sign;
2999
3000 /* alias for a->dp [source] */
3001 tmpa = a->dp;
3002
3003 /* alias for c->dp [dest] */
3004 tmpc = c->dp;
3005
3006 /* zero carry */
3007 u = 0;
3008
3009 /* compute columns */
3010 for (ix = 0; ix < a->used; ix++) {
3011 /* compute product and carry sum for this term */
3012 r = ((mp_word) u) + ((mp_word)*tmpa++) * ((mp_word)b);
3013
3014 /* mask off higher bits to get a single digit */
3015 *tmpc++ = (mp_digit) (r & ((mp_word) MP_MASK));
3016
3017 /* send carry into next iteration */
3018 u = (mp_digit) (r >> ((mp_word) DIGIT_BIT));
3019 }
3020
3021 /* store final carry [if any] and increment ix offset */
3022 *tmpc++ = u;
3023 ++ix;
3024
3025 /* now zero digits above the top */
3026 while (ix++ < olduse) {
3027 *tmpc++ = 0;
3028 }
3029
3030 /* set used count */
3031 c->used = a->used + 1;
3032 mp_clamp(c);
3033
3034 return MP_OKAY;
3035}
3036
3037
3038/* d = a * b (mod c) */
3039#if defined(FREESCALE_LTC_TFM)
3040int wolfcrypt_mp_mulmod(mp_int *a, mp_int *b, mp_int *c, mp_int *d)
3041#else
3042int mp_mulmod (mp_int * a, mp_int * b, mp_int * c, mp_int * d)
3043#endif
3044{
3045 int res;
3046 mp_int t;
3047
3048 if ((res = mp_init_size (&t, c->used)) != MP_OKAY) {
3049 return res;
3050 }
3051
3052 res = mp_mul (a, b, &t);
3053 if (res == MP_OKAY) {
3054 res = mp_mod (&t, c, d);
3055 }
3056
3057 mp_clear (&t);
3058 return res;
3059}
3060
3061
3062/* d = a - b (mod c) */
3063int mp_submod(mp_int* a, mp_int* b, mp_int* c, mp_int* d)
3064{
3065 int res;
3066 mp_int t;
3067
3068 if ((res = mp_init (&t)) != MP_OKAY) {
3069 return res;
3070 }
3071
3072 res = mp_sub (a, b, &t);
3073 if (res == MP_OKAY) {
3074 res = mp_mod (&t, c, d);
3075 }
3076
3077 mp_clear (&t);
3078
3079 return res;
3080}
3081
3082/* d = a + b (mod c) */
3083int mp_addmod(mp_int* a, mp_int* b, mp_int* c, mp_int* d)
3084{
3085 int res;
3086 mp_int t;
3087
3088 if ((res = mp_init (&t)) != MP_OKAY) {
3089 return res;
3090 }
3091
3092 res = mp_add (a, b, &t);
3093 if (res == MP_OKAY) {
3094 res = mp_mod (&t, c, d);
3095 }
3096
3097 mp_clear (&t);
3098
3099 return res;
3100}
3101
3102/* d = a - b (mod c) - a < c and b < c and positive */
3103int mp_submod_ct(mp_int* a, mp_int* b, mp_int* c, mp_int* d)
3104{
3105 int res;
3106 mp_int t;
3107 mp_int* r = d;
3108
3109 if (c == d) {
3110 r = &t;
3111
3112 if ((res = mp_init (r)) != MP_OKAY) {
3113 return res;
3114 }
3115 }
3116
3117 res = mp_sub (a, b, r);
3118 if (res == MP_OKAY) {
3119 if (mp_isneg (r)) {
3120 res = mp_add (r, c, d);
3121 } else if (c == d) {
3122 res = mp_copy (r, d);
3123 }
3124 }
3125
3126 if (c == d) {
3127 mp_clear (r);
3128 }
3129
3130 return res;
3131}
3132
3133/* d = a + b (mod c) - a < c and b < c and positive */
3134int mp_addmod_ct(mp_int* a, mp_int* b, mp_int* c, mp_int* d)
3135{
3136 int res;
3137 mp_int t;
3138 mp_int* r = d;
3139
3140 if (c == d) {
3141 r = &t;
3142
3143 if ((res = mp_init (r)) != MP_OKAY) {
3144 return res;
3145 }
3146 }
3147
3148 res = mp_add (a, b, r);
3149 if (res == MP_OKAY) {
3150 if (mp_cmp (r, c) != MP_LT) {
3151 res = mp_sub (r, c, d);
3152 } else if (c == d) {
3153 res = mp_copy (r, d);
3154 }
3155 }
3156
3157 if (c == d) {
3158 mp_clear (r);
3159 }
3160
3161 return res;
3162}
3163
3164/* computes b = a*a */
3165int mp_sqr (mp_int * a, mp_int * b)
3166{
3167 int res;
3168
3169 {
3170#ifdef BN_FAST_S_MP_SQR_C
3171 /* can we use the fast comba multiplier? */
3172 if ((a->used * 2 + 1) < (int)MP_WARRAY &&
3173 a->used <
3174 (1 << (sizeof(mp_word) * CHAR_BIT - 2*DIGIT_BIT - 1))) {
3175 res = fast_s_mp_sqr (a, b);
3176 } else
3177#endif
3178#ifdef BN_S_MP_SQR_C
3179 res = s_mp_sqr (a, b);
3180#else
3181 res = MP_VAL;
3182#endif
3183 }
3184 b->sign = MP_ZPOS;
3185 return res;
3186}
3187
3188
3189/* high level multiplication (handles sign) */
3190#if defined(FREESCALE_LTC_TFM)
3191int wolfcrypt_mp_mul(mp_int *a, mp_int *b, mp_int *c)
3192#else
3193int mp_mul (mp_int * a, mp_int * b, mp_int * c)
3194#endif
3195{
3196 int res, neg;
3197 neg = (a->sign == b->sign) ? MP_ZPOS : MP_NEG;
3198
3199 {
3200#ifdef BN_FAST_S_MP_MUL_DIGS_C
3201 /* can we use the fast multiplier?
3202 *
3203 * The fast multiplier can be used if the output will
3204 * have less than MP_WARRAY digits and the number of
3205 * digits won't affect carry propagation
3206 */
3207 int digs = a->used + b->used + 1;
3208
3209 if ((digs < (int)MP_WARRAY) &&
3210 MIN(a->used, b->used) <=
3211 (1L << ((CHAR_BIT * sizeof (mp_word)) - (2 * DIGIT_BIT)))) {
3212 res = fast_s_mp_mul_digs (a, b, c, digs);
3213 } else
3214#endif
3215#ifdef BN_S_MP_MUL_DIGS_C
3216 res = s_mp_mul (a, b, c); /* uses s_mp_mul_digs */
3217#else
3218 res = MP_VAL;
3219#endif
3220
3221 }
3222 c->sign = (c->used > 0) ? neg : MP_ZPOS;
3223 return res;
3224}
3225
3226
3227/* b = a*2 */
3228int mp_mul_2(mp_int * a, mp_int * b)
3229{
3230 int x, res, oldused;
3231
3232 /* grow to accommodate result */
3233 if (b->alloc < a->used + 1) {
3234 if ((res = mp_grow (b, a->used + 1)) != MP_OKAY) {
3235 return res;
3236 }
3237 }
3238
3239 oldused = b->used;
3240 b->used = a->used;
3241
3242 {
3243 mp_digit r, rr, *tmpa, *tmpb;
3244
3245 /* alias for source */
3246 tmpa = a->dp;
3247
3248 /* alias for dest */
3249 tmpb = b->dp;
3250
3251 /* carry */
3252 r = 0;
3253 for (x = 0; x < a->used; x++) {
3254
3255 /* get what will be the *next* carry bit from the
3256 * MSB of the current digit
3257 */
3258 rr = *tmpa >> ((mp_digit)(DIGIT_BIT - 1));
3259
3260 /* now shift up this digit, add in the carry [from the previous] */
3261 *tmpb++ = (mp_digit)(((*tmpa++ << ((mp_digit)1)) | r) & MP_MASK);
3262
3263 /* copy the carry that would be from the source
3264 * digit into the next iteration
3265 */
3266 r = rr;
3267 }
3268
3269 /* new leading digit? */
3270 if (r != 0) {
3271 /* add a MSB which is always 1 at this point */
3272 *tmpb = 1;
3273 ++(b->used);
3274 }
3275
3276 /* now zero any excess digits on the destination
3277 * that we didn't write to
3278 */
3279 tmpb = b->dp + b->used;
3280 for (x = b->used; x < oldused; x++) {
3281 *tmpb++ = 0;
3282 }
3283 }
3284 b->sign = a->sign;
3285 return MP_OKAY;
3286}
3287
3288
3289/* divide by three (based on routine from MPI and the GMP manual) */
3290int mp_div_3 (mp_int * a, mp_int *c, mp_digit * d)
3291{
3292 mp_int q;
3293 mp_word w, t;
3294 mp_digit b;
3295 int res, ix;
3296
3297 /* b = 2**DIGIT_BIT / 3 */
3298 b = (mp_digit) ( (((mp_word)1) << ((mp_word)DIGIT_BIT)) / ((mp_word)3) );
3299
3300 if ((res = mp_init_size(&q, a->used)) != MP_OKAY) {
3301 return res;
3302 }
3303
3304 q.used = a->used;
3305 q.sign = a->sign;
3306 w = 0;
3307
3308 if (a->used == 0) {
3309 mp_clear(&q);
3310 return MP_VAL;
3311 }
3312
3313 for (ix = a->used - 1; ix >= 0; ix--) {
3314 w = (w << ((mp_word)DIGIT_BIT)) | ((mp_word)a->dp[ix]);
3315
3316 if (w >= 3) {
3317 /* multiply w by [1/3] */
3318 t = (w * ((mp_word)b)) >> ((mp_word)DIGIT_BIT);
3319
3320 /* now subtract 3 * [w/3] from w, to get the remainder */
3321 w -= t+t+t;
3322
3323 /* fixup the remainder as required since
3324 * the optimization is not exact.
3325 */
3326 while (w >= 3) {
3327 t += 1;
3328 w -= 3;
3329 }
3330 } else {
3331 t = 0;
3332 }
3333 q.dp[ix] = (mp_digit)t;
3334 }
3335
3336 /* [optional] store the remainder */
3337 if (d != NULL) {
3338 *d = (mp_digit)w;
3339 }
3340
3341 /* [optional] store the quotient */
3342 if (c != NULL) {
3343 mp_clamp(&q);
3344 mp_exch(&q, c);
3345 }
3346 mp_clear(&q);
3347
3348 return res;
3349}
3350
3351
3352/* init an mp_init for a given size */
3353int mp_init_size (mp_int * a, int size)
3354{
3355 /* pad size so there are always extra digits */
3356 size += (MP_PREC * 2) - (size % MP_PREC);
3357
3358 /* alloc mem */
3359 a->dp = (mp_digit *)XMALLOC (sizeof (mp_digit) * size, NULL,
3360 DYNAMIC_TYPE_BIGINT);
3361 if (a->dp == NULL) {
3362 return MP_MEM;
3363 }
3364
3365 /* set the members */
3366 a->used = 0;
3367 a->alloc = size;
3368 a->sign = MP_ZPOS;
3369#ifdef HAVE_WOLF_BIGINT
3370 wc_bigint_init(&a->raw);
3371#endif
3372
3373 /* zero the digits */
3374 XMEMSET(a->dp, 0, sizeof (mp_digit) * size);
3375
3376 return MP_OKAY;
3377}
3378
3379
3380/* the list of squaring...
3381 * you do like mult except the offset of the tmpx [one that
3382 * starts closer to zero] can't equal the offset of tmpy.
3383 * So basically you set up iy like before then you min it with
3384 * (ty-tx) so that it never happens. You double all those
3385 * you add in the inner loop
3386
3387After that loop you do the squares and add them in.
3388*/
3389
3390int fast_s_mp_sqr (mp_int * a, mp_int * b)
3391{
3392 int olduse, res, pa, ix, iz;
3393 /* uses dynamic memory and slower */
3394 WC_DECLARE_VAR(W, mp_digit, MP_WARRAY, 0);
3395 mp_digit *tmpx;
3396 mp_word W1;
3397
3398 /* grow the destination as required */
3399 pa = a->used + a->used;
3400 if (b->alloc < pa) {
3401 if ((res = mp_grow (b, pa)) != MP_OKAY) {
3402 return res;
3403 }
3404 }
3405
3406 if (pa > (int)MP_WARRAY)
3407 return MP_RANGE; /* TAO range check */
3408
3409 if (pa == 0) {
3410 /* Nothing to do. Zero result and return. */
3411 mp_zero(b);
3412 return MP_OKAY;
3413 }
3414
3415 WC_ALLOC_VAR_EX(W, mp_digit, pa, NULL, DYNAMIC_TYPE_BIGINT,
3416 return MP_MEM);
3417
3418 /* number of output digits to produce */
3419 W1 = 0;
3420 for (ix = 0; ix < pa; ix++) {
3421 int tx, ty, iy;
3422 mp_word _W;
3423 mp_digit *tmpy;
3424
3425 /* clear counter */
3426 _W = 0;
3427
3428 /* get offsets into the two bignums */
3429 ty = MIN(a->used-1, ix);
3430 tx = ix - ty;
3431
3432 /* setup temp aliases */
3433 tmpx = a->dp + tx;
3434 tmpy = a->dp + ty;
3435
3436 /* this is the number of times the loop will iterate, essentially
3437 while (tx++ < a->used && ty-- >= 0) { ... }
3438 */
3439 iy = MIN(a->used-tx, ty+1);
3440
3441 /* now for squaring tx can never equal ty
3442 * we halve the distance since they approach at a rate of 2x
3443 * and we have to round because odd cases need to be executed
3444 */
3445 iy = MIN(iy, (ty-tx+1)>>1);
3446
3447 /* execute loop */
3448 for (iz = 0; iz < iy; iz++) {
3449 _W += ((mp_word)*tmpx++)*((mp_word)*tmpy--);
3450 }
3451
3452 /* double the inner product and add carry */
3453 _W = _W + _W + W1;
3454
3455 /* even columns have the square term in them */
3456 if ((ix&1) == 0) {
3457 _W += ((mp_word)a->dp[ix>>1])*((mp_word)a->dp[ix>>1]);
3458 }
3459
3460 /* store it */
3461 W[ix] = (mp_digit)(_W & MP_MASK);
3462
3463 /* make next carry */
3464 W1 = _W >> ((mp_word)DIGIT_BIT);
3465 }
3466
3467 /* setup dest */
3468 olduse = b->used;
3469 b->used = a->used+a->used;
3470
3471 {
3472 mp_digit *tmpb;
3473 tmpb = b->dp;
3474 for (ix = 0; ix < pa; ix++) {
3475 *tmpb++ = (mp_digit)(W[ix] & MP_MASK);
3476 }
3477
3478 /* clear unused digits [that existed in the old copy of c] */
3479 for (; ix < olduse; ix++) {
3480 *tmpb++ = 0;
3481 }
3482 }
3483 mp_clamp (b);
3484
3485 WC_FREE_VAR_EX(W, NULL, DYNAMIC_TYPE_BIGINT);
3486
3487 return MP_OKAY;
3488}
3489
3490
3491/* Fast (comba) multiplier
3492 *
3493 * This is the fast column-array [comba] multiplier. It is
3494 * designed to compute the columns of the product first
3495 * then handle the carries afterwards. This has the effect
3496 * of making the nested loops that compute the columns very
3497 * simple and schedulable on super-scalar processors.
3498 *
3499 * This has been modified to produce a variable number of
3500 * digits of output so if say only a half-product is required
3501 * you don't have to compute the upper half (a feature
3502 * required for fast Barrett reduction).
3503 *
3504 * Based on Algorithm 14.12 on pp.595 of HAC.
3505 *
3506 */
3507int fast_s_mp_mul_digs (mp_int * a, mp_int * b, mp_int * c, int digs)
3508{
3509 int olduse, res, pa, ix, iz;
3510 /* uses dynamic memory and slower */
3511 WC_DECLARE_VAR(W, mp_digit, MP_WARRAY, 0);
3512 mp_word _W;
3513
3514 /* grow the destination as required */
3515 if (c->alloc < digs) {
3516 if ((res = mp_grow (c, digs)) != MP_OKAY) {
3517 return res;
3518 }
3519 }
3520
3521 /* number of output digits to produce */
3522 pa = MIN(digs, a->used + b->used);
3523 if (pa > (int)MP_WARRAY)
3524 return MP_RANGE; /* TAO range check */
3525
3526 if (pa == 0) {
3527 /* Nothing to do. Zero result and return. */
3528 mp_zero(c);
3529 return MP_OKAY;
3530 }
3531
3532 WC_ALLOC_VAR_EX(W, mp_digit, pa, NULL, DYNAMIC_TYPE_BIGINT,
3533 return MP_MEM);
3534
3535 /* clear the carry */
3536 _W = 0;
3537 for (ix = 0; ix < pa; ix++) {
3538 int tx, ty;
3539 int iy;
3540 mp_digit *tmpx, *tmpy;
3541
3542 if ((a->used > 0) && (b->used > 0)) {
3543 /* get offsets into the two bignums */
3544 ty = MIN(b->used-1, ix);
3545 tx = ix - ty;
3546
3547 /* setup temp aliases */
3548 tmpx = a->dp + tx;
3549 tmpy = b->dp + ty;
3550
3551 /* this is the number of times the loop will iterate, essentially
3552 while (tx++ < a->used && ty-- >= 0) { ... }
3553 */
3554 iy = MIN(a->used-tx, ty+1);
3555
3556 /* execute loop */
3557 for (iz = 0; iz < iy; ++iz) {
3558 _W += ((mp_word)*tmpx++)*((mp_word)*tmpy--);
3559
3560 }
3561 }
3562
3563 /* store term */
3564 W[ix] = (mp_digit)(((mp_digit)_W) & MP_MASK);
3565
3566 /* make next carry */
3567 _W = _W >> ((mp_word)DIGIT_BIT);
3568 }
3569
3570 /* setup dest */
3571 olduse = c->used;
3572 c->used = pa;
3573
3574 {
3575 mp_digit *tmpc;
3576 tmpc = c->dp;
3577 for (ix = 0; ix < pa; ix++) { /* JRB, +1 could read uninitialized data */
3578 /* now extract the previous digit [below the carry] */
3579 *tmpc++ = W[ix];
3580 }
3581
3582 /* clear unused digits [that existed in the old copy of c] */
3583 for (; ix < olduse; ix++) {
3584 *tmpc++ = 0;
3585 }
3586 }
3587 mp_clamp (c);
3588
3589 WC_FREE_VAR_EX(W, NULL, DYNAMIC_TYPE_BIGINT);
3590
3591 return MP_OKAY;
3592}
3593
3594
3595/* low level squaring, b = a*a, HAC pp.596-597, Algorithm 14.16 */
3596int s_mp_sqr (mp_int * a, mp_int * b)
3597{
3598 mp_int t;
3599 int res, ix, iy, pa;
3600 mp_word r;
3601 mp_digit u, tmpx, *tmpt;
3602
3603 pa = a->used;
3604 if ((res = mp_init_size (&t, 2*pa + 1)) != MP_OKAY) {
3605 return res;
3606 }
3607
3608 /* default used is maximum possible size */
3609 t.used = 2*pa + 1;
3610
3611 for (ix = 0; ix < pa; ix++) {
3612 /* first calculate the digit at 2*ix */
3613 /* calculate double precision result */
3614 r = ((mp_word) t.dp[2*ix]) +
3615 ((mp_word)a->dp[ix])*((mp_word)a->dp[ix]);
3616
3617 /* store lower part in result */
3618 t.dp[ix+ix] = (mp_digit) (r & ((mp_word) MP_MASK));
3619
3620 /* get the carry */
3621 u = (mp_digit)(r >> ((mp_word) DIGIT_BIT));
3622
3623 /* left hand side of A[ix] * A[iy] */
3624 tmpx = a->dp[ix];
3625
3626 /* alias for where to store the results */
3627 tmpt = t.dp + (2*ix + 1);
3628
3629 for (iy = ix + 1; iy < pa; iy++) {
3630 /* first calculate the product */
3631 r = ((mp_word)tmpx) * ((mp_word)a->dp[iy]);
3632
3633 /* now calculate the double precision result, note we use
3634 * addition instead of *2 since it's easier to optimize
3635 */
3636 r = ((mp_word) *tmpt) + r + r + ((mp_word) u);
3637
3638 /* store lower part */
3639 *tmpt++ = (mp_digit) (r & ((mp_word) MP_MASK));
3640
3641 /* get carry */
3642 u = (mp_digit)(r >> ((mp_word) DIGIT_BIT));
3643 }
3644 /* propagate upwards */
3645 while (u != ((mp_digit) 0)) {
3646 r = ((mp_word) *tmpt) + ((mp_word) u);
3647 *tmpt++ = (mp_digit) (r & ((mp_word) MP_MASK));
3648 u = (mp_digit)(r >> ((mp_word) DIGIT_BIT));
3649 }
3650 }
3651
3652 mp_clamp (&t);
3653 mp_exch (&t, b);
3654 mp_clear (&t);
3655 return MP_OKAY;
3656}
3657
3658
3659/* multiplies |a| * |b| and only computes up to digs digits of result
3660 * HAC pp. 595, Algorithm 14.12 Modified so you can control how
3661 * many digits of output are created.
3662 */
3663int s_mp_mul_digs (mp_int * a, mp_int * b, mp_int * c, int digs)
3664{
3665 mp_int t;
3666 int res, pa, pb, ix, iy;
3667 mp_digit u;
3668 mp_word r;
3669 mp_digit tmpx, *tmpt, *tmpy;
3670
3671 /* can we use the fast multiplier? */
3672 if ((digs < (int)MP_WARRAY) &&
3673 MIN (a->used, b->used) <
3674 (1L << ((CHAR_BIT * sizeof (mp_word)) - (2 * DIGIT_BIT)))) {
3675 return fast_s_mp_mul_digs (a, b, c, digs);
3676 }
3677
3678 if ((res = mp_init_size (&t, digs)) != MP_OKAY) {
3679 return res;
3680 }
3681 t.used = digs;
3682
3683 /* compute the digits of the product directly */
3684 pa = a->used;
3685 for (ix = 0; ix < pa; ix++) {
3686 /* set the carry to zero */
3687 u = 0;
3688
3689 /* limit ourselves to making digs digits of output */
3690 pb = MIN (b->used, digs - ix);
3691
3692 /* setup some aliases */
3693 /* copy of the digit from a used within the nested loop */
3694 tmpx = a->dp[ix];
3695
3696 /* an alias for the destination shifted ix places */
3697 tmpt = t.dp + ix;
3698
3699 /* an alias for the digits of b */
3700 tmpy = b->dp;
3701
3702 /* compute the columns of the output and propagate the carry */
3703 for (iy = 0; iy < pb; iy++) {
3704 /* compute the column as a mp_word */
3705 r = ((mp_word)*tmpt) +
3706 ((mp_word)tmpx) * ((mp_word)*tmpy++) +
3707 ((mp_word) u);
3708
3709 /* the new column is the lower part of the result */
3710 *tmpt++ = (mp_digit) (r & ((mp_word) MP_MASK));
3711
3712 /* get the carry word from the result */
3713 u = (mp_digit) (r >> ((mp_word) DIGIT_BIT));
3714 }
3715 /* set carry if it is placed below digs */
3716 if (ix + iy < digs) {
3717 *tmpt = u;
3718 }
3719 }
3720
3721 mp_clamp (&t);
3722 mp_exch (&t, c);
3723
3724 mp_clear (&t);
3725 return MP_OKAY;
3726}
3727
3728
3729/*
3730 * shifts with subtractions when the result is greater than b.
3731 *
3732 * The method is slightly modified to shift B unconditionally up to just under
3733 * the leading bit of b. This saves a lot of multiple precision shifting.
3734 */
3735int mp_montgomery_calc_normalization (mp_int * a, mp_int * b)
3736{
3737 int x, bits, res;
3738
3739 /* how many bits of last digit does b use */
3740 bits = mp_count_bits (b) % DIGIT_BIT;
3741
3742 if (b->used > 1) {
3743 if ((res = mp_2expt (a, (b->used - 1) * DIGIT_BIT + bits - 1))
3744 != MP_OKAY) {
3745 return res;
3746 }
3747 } else {
3748 if ((res = mp_set(a, 1)) != MP_OKAY) {
3749 return res;
3750 }
3751 bits = 1;
3752 }
3753
3754 /* now compute C = A * B mod b */
3755 for (x = bits - 1; x < (int)DIGIT_BIT; x++) {
3756 if ((res = mp_mul_2 (a, a)) != MP_OKAY) {
3757 return res;
3758 }
3759 if (mp_cmp_mag (a, b) != MP_LT) {
3760 if ((res = s_mp_sub (a, b, a)) != MP_OKAY) {
3761 return res;
3762 }
3763 }
3764 }
3765
3766 return MP_OKAY;
3767}
3768
3769
3770#ifdef MP_LOW_MEM
3771 #define TAB_SIZE 32
3772#else
3773 #define TAB_SIZE 256
3774#endif
3775
3776int s_mp_exptmod (mp_int * G, mp_int * X, mp_int * P, mp_int * Y, int redmode)
3777{
3778 mp_int M[TAB_SIZE], res, mu;
3779 mp_digit buf;
3780 int err, bitbuf, bitcpy, bitcnt, mode, digidx, x, y, winsize;
3781 int (*redux)(mp_int*,mp_int*,mp_int*);
3782
3783 /* find window size */
3784 x = mp_count_bits (X);
3785 if (x <= 7) {
3786 winsize = 2;
3787 } else if (x <= 36) {
3788 winsize = 3;
3789 } else if (x <= 140) {
3790 winsize = 4;
3791 } else if (x <= 450) {
3792 winsize = 5;
3793 } else if (x <= 1303) {
3794 winsize = 6;
3795 } else if (x <= 3529) {
3796 winsize = 7;
3797 } else {
3798 winsize = 8;
3799 }
3800
3801#ifdef MP_LOW_MEM
3802 if (winsize > 5) {
3803 winsize = 5;
3804 }
3805#endif
3806
3807 /* init M array */
3808 /* init first cell */
3809 if ((err = mp_init(&M[1])) != MP_OKAY) {
3810 return err;
3811 }
3812
3813 /* now init the second half of the array */
3814 for (x = 1<<(winsize-1); x < (1 << winsize); x++) {
3815 if ((err = mp_init(&M[x])) != MP_OKAY) {
3816 for (y = 1<<(winsize-1); y < x; y++) {
3817 mp_clear (&M[y]);
3818 }
3819 mp_clear(&M[1]);
3820 return err;
3821 }
3822 }
3823
3824 /* create mu, used for Barrett reduction */
3825 if ((err = mp_init (&mu)) != MP_OKAY) {
3826 goto LBL_M;
3827 }
3828
3829 if (redmode == 0) {
3830 if ((err = mp_reduce_setup (&mu, P)) != MP_OKAY) {
3831 goto LBL_MU;
3832 }
3833 redux = mp_reduce;
3834 } else {
3835 if ((err = mp_reduce_2k_setup_l (P, &mu)) != MP_OKAY) {
3836 goto LBL_MU;
3837 }
3838 redux = mp_reduce_2k_l;
3839 }
3840
3841 /* create M table
3842 *
3843 * The M table contains powers of the base,
3844 * e.g. M[x] = G**x mod P
3845 *
3846 * The first half of the table is not
3847 * computed though accept for M[0] and M[1]
3848 */
3849 if ((err = mp_mod (G, P, &M[1])) != MP_OKAY) {
3850 goto LBL_MU;
3851 }
3852
3853 /* compute the value at M[1<<(winsize-1)] by squaring
3854 * M[1] (winsize-1) times
3855 */
3856 if ((err = mp_copy (&M[1], &M[(mp_digit)(1 << (winsize - 1))])) != MP_OKAY) {
3857 goto LBL_MU;
3858 }
3859
3860 for (x = 0; x < (winsize - 1); x++) {
3861 /* square it */
3862 if ((err = mp_sqr (&M[(mp_digit)(1 << (winsize - 1))],
3863 &M[(mp_digit)(1 << (winsize - 1))])) != MP_OKAY) {
3864 goto LBL_MU;
3865 }
3866
3867 /* reduce modulo P */
3868 if ((err = redux (&M[(mp_digit)(1 << (winsize - 1))], P, &mu)) != MP_OKAY) {
3869 goto LBL_MU;
3870 }
3871 }
3872
3873 /* create upper table, that is M[x] = M[x-1] * M[1] (mod P)
3874 * for x = (2**(winsize - 1) + 1) to (2**winsize - 1)
3875 */
3876 for (x = (1 << (winsize - 1)) + 1; x < (1 << winsize); x++) {
3877 if ((err = mp_mul (&M[x - 1], &M[1], &M[x])) != MP_OKAY) {
3878 goto LBL_MU;
3879 }
3880 if ((err = redux (&M[x], P, &mu)) != MP_OKAY) {
3881 goto LBL_MU;
3882 }
3883 }
3884
3885 /* setup result */
3886 if ((err = mp_init (&res)) != MP_OKAY) {
3887 goto LBL_MU;
3888 }
3889 if ((err = mp_set (&res, 1)) != MP_OKAY) {
3890 goto LBL_MU;
3891 }
3892
3893 /* set initial mode and bit cnt */
3894 mode = 0;
3895 bitcnt = 1;
3896 buf = 0;
3897 digidx = X->used - 1;
3898 bitcpy = 0;
3899 bitbuf = 0;
3900
3901 for (;;) {
3902 /* grab next digit as required */
3903 if (--bitcnt == 0) {
3904 /* if digidx == -1 we are out of digits */
3905 if (digidx == -1) {
3906 break;
3907 }
3908 /* read next digit and reset the bitcnt */
3909 buf = X->dp[digidx--];
3910 bitcnt = (int) DIGIT_BIT;
3911 }
3912
3913 /* grab the next msb from the exponent */
3914 y = (int)(buf >> (mp_digit)(DIGIT_BIT - 1)) & 1;
3915 buf <<= (mp_digit)1;
3916
3917 /* if the bit is zero and mode == 0 then we ignore it
3918 * These represent the leading zero bits before the first 1 bit
3919 * in the exponent. Technically this opt is not required but it
3920 * does lower the # of trivial squaring/reductions used
3921 */
3922 if (mode == 0 && y == 0) {
3923 continue;
3924 }
3925
3926 /* if the bit is zero and mode == 1 then we square */
3927 if (mode == 1 && y == 0) {
3928 if ((err = mp_sqr (&res, &res)) != MP_OKAY) {
3929 goto LBL_RES;
3930 }
3931 if ((err = redux (&res, P, &mu)) != MP_OKAY) {
3932 goto LBL_RES;
3933 }
3934 continue;
3935 }
3936
3937 /* else we add it to the window */
3938 bitbuf |= (y << (winsize - ++bitcpy));
3939 mode = 2;
3940
3941 if (bitcpy == winsize) {
3942 /* ok window is filled so square as required and multiply */
3943 /* square first */
3944 for (x = 0; x < winsize; x++) {
3945 if ((err = mp_sqr (&res, &res)) != MP_OKAY) {
3946 goto LBL_RES;
3947 }
3948 if ((err = redux (&res, P, &mu)) != MP_OKAY) {
3949 goto LBL_RES;
3950 }
3951 }
3952
3953 /* then multiply */
3954 if ((err = mp_mul (&res, &M[bitbuf], &res)) != MP_OKAY) {
3955 goto LBL_RES;
3956 }
3957 if ((err = redux (&res, P, &mu)) != MP_OKAY) {
3958 goto LBL_RES;
3959 }
3960
3961 /* empty window and reset */
3962 bitcpy = 0;
3963 bitbuf = 0;
3964 mode = 1;
3965 }
3966 }
3967
3968 /* if bits remain then square/multiply */
3969 if (mode == 2 && bitcpy > 0) {
3970 /* square then multiply if the bit is set */
3971 for (x = 0; x < bitcpy; x++) {
3972 if ((err = mp_sqr (&res, &res)) != MP_OKAY) {
3973 goto LBL_RES;
3974 }
3975 if ((err = redux (&res, P, &mu)) != MP_OKAY) {
3976 goto LBL_RES;
3977 }
3978
3979 bitbuf <<= 1;
3980 if ((bitbuf & (1 << winsize)) != 0) {
3981 /* then multiply */
3982 if ((err = mp_mul (&res, &M[1], &res)) != MP_OKAY) {
3983 goto LBL_RES;
3984 }
3985 if ((err = redux (&res, P, &mu)) != MP_OKAY) {
3986 goto LBL_RES;
3987 }
3988 }
3989 }
3990 }
3991
3992 mp_exch (&res, Y);
3993 err = MP_OKAY;
3994LBL_RES:mp_clear (&res);
3995LBL_MU:mp_clear (&mu);
3996LBL_M:
3997 mp_clear(&M[1]);
3998 for (x = 1<<(winsize-1); x < (1 << winsize); x++) {
3999 mp_clear (&M[x]);
4000 }
4001 return err;
4002}
4003
4004
4005/* pre-calculate the value required for Barrett reduction
4006 * For a given modulus "b" it calculates the value required in "a"
4007 */
4008int mp_reduce_setup (mp_int * a, mp_int * b)
4009{
4010 int res;
4011
4012 if ((res = mp_2expt (a, b->used * 2 * DIGIT_BIT)) != MP_OKAY) {
4013 return res;
4014 }
4015 return mp_div (a, b, a, NULL);
4016}
4017
4018
4019/* reduces x mod m, assumes 0 < x < m**2, mu is
4020 * precomputed via mp_reduce_setup.
4021 * From HAC pp.604 Algorithm 14.42
4022 */
4023int mp_reduce (mp_int * x, mp_int * m, mp_int * mu)
4024{
4025 mp_int q;
4026 int res, um = m->used;
4027
4028 /* q = x */
4029 if ((res = mp_init_copy (&q, x)) != MP_OKAY) {
4030 return res;
4031 }
4032
4033 /* q1 = x / b**(k-1) */
4034 mp_rshd (&q, um - 1);
4035
4036 /* according to HAC this optimization is ok */
4037 if (((mp_word) um) > (((mp_digit)1) << (DIGIT_BIT - 1))) {
4038 if ((res = mp_mul (&q, mu, &q)) != MP_OKAY) {
4039 goto CLEANUP;
4040 }
4041 } else {
4042#ifdef BN_S_MP_MUL_HIGH_DIGS_C
4043 if ((res = s_mp_mul_high_digs (&q, mu, &q, um)) != MP_OKAY) {
4044 goto CLEANUP;
4045 }
4046#elif defined(BN_FAST_S_MP_MUL_HIGH_DIGS_C)
4047 if ((res = fast_s_mp_mul_high_digs (&q, mu, &q, um)) != MP_OKAY) {
4048 goto CLEANUP;
4049 }
4050#else
4051 {
4052 res = MP_VAL;
4053 goto CLEANUP;
4054 }
4055#endif
4056 }
4057
4058 /* q3 = q2 / b**(k+1) */
4059 mp_rshd (&q, um + 1);
4060
4061 /* x = x mod b**(k+1), quick (no division) */
4062 if ((res = mp_mod_2d (x, DIGIT_BIT * (um + 1), x)) != MP_OKAY) {
4063 goto CLEANUP;
4064 }
4065
4066 /* q = q * m mod b**(k+1), quick (no division) */
4067 if ((res = s_mp_mul_digs (&q, m, &q, um + 1)) != MP_OKAY) {
4068 goto CLEANUP;
4069 }
4070
4071 /* x = x - q */
4072 if ((res = mp_sub (x, &q, x)) != MP_OKAY) {
4073 goto CLEANUP;
4074 }
4075
4076 /* If x < 0, add b**(k+1) to it */
4077 if (mp_cmp_d (x, 0) == MP_LT) {
4078 if ((res = mp_set (&q, 1)) != MP_OKAY)
4079 goto CLEANUP;
4080 if ((res = mp_lshd (&q, um + 1)) != MP_OKAY)
4081 goto CLEANUP;
4082 if ((res = mp_add (x, &q, x)) != MP_OKAY)
4083 goto CLEANUP;
4084 }
4085
4086 /* Back off if it's too big */
4087 while (mp_cmp (x, m) != MP_LT) {
4088 if ((res = s_mp_sub (x, m, x)) != MP_OKAY) {
4089 goto CLEANUP;
4090 }
4091 }
4092
4093CLEANUP:
4094 mp_clear (&q);
4095
4096 return res;
4097}
4098
4099
4100/* reduces a modulo n where n is of the form 2**p - d
4101 This differs from reduce_2k since "d" can be larger
4102 than a single digit.
4103*/
4104int mp_reduce_2k_l(mp_int *a, mp_int *n, mp_int *d)
4105{
4106 mp_int q;
4107 int p, res;
4108
4109 if ((res = mp_init(&q)) != MP_OKAY) {
4110 return res;
4111 }
4112
4113 p = mp_count_bits(n);
4114top:
4115 /* q = a/2**p, a = a mod 2**p */
4116 if ((res = mp_div_2d(a, p, &q, a)) != MP_OKAY) {
4117 goto ERR;
4118 }
4119
4120 /* q = q * d */
4121 if ((res = mp_mul(&q, d, &q)) != MP_OKAY) {
4122 goto ERR;
4123 }
4124
4125 /* a = a + q */
4126 if ((res = s_mp_add(a, &q, a)) != MP_OKAY) {
4127 goto ERR;
4128 }
4129
4130 if (mp_cmp_mag(a, n) != MP_LT) {
4131 if ((res = s_mp_sub(a, n, a)) != MP_OKAY) {
4132 goto ERR;
4133 }
4134 goto top;
4135 }
4136
4137ERR:
4138 mp_clear(&q);
4139 return res;
4140}
4141
4142
4143/* determines the setup value */
4144int mp_reduce_2k_setup_l(mp_int *a, mp_int *d)
4145{
4146 int res;
4147 mp_int tmp;
4148
4149 if ((res = mp_init(&tmp)) != MP_OKAY) {
4150 return res;
4151 }
4152
4153 if ((res = mp_2expt(&tmp, mp_count_bits(a))) != MP_OKAY) {
4154 goto ERR;
4155 }
4156
4157 if ((res = s_mp_sub(&tmp, a, d)) != MP_OKAY) {
4158 goto ERR;
4159 }
4160
4161ERR:
4162 mp_clear(&tmp);
4163 return res;
4164}
4165
4166
4167/* multiplies |a| * |b| and does not compute the lower digs digits
4168 * [meant to get the higher part of the product]
4169 */
4170int s_mp_mul_high_digs (mp_int * a, mp_int * b, mp_int * c, int digs)
4171{
4172 mp_int t;
4173 int res, pa, pb, ix, iy;
4174 mp_digit u;
4175 mp_word r;
4176 mp_digit tmpx, *tmpt, *tmpy;
4177
4178 /* can we use the fast multiplier? */
4179#ifdef BN_FAST_S_MP_MUL_HIGH_DIGS_C
4180 if (((a->used + b->used + 1) < (int)MP_WARRAY)
4181 && MIN (a->used, b->used) <
4182 (1L << ((CHAR_BIT * sizeof (mp_word)) - (2 * DIGIT_BIT)))) {
4183 return fast_s_mp_mul_high_digs (a, b, c, digs);
4184 }
4185#endif
4186
4187 if ((res = mp_init_size (&t, a->used + b->used + 1)) != MP_OKAY) {
4188 return res;
4189 }
4190 t.used = a->used + b->used + 1;
4191
4192 pa = a->used;
4193 pb = b->used;
4194 for (ix = 0; ix < pa && a->dp; ix++) {
4195 /* clear the carry */
4196 u = 0;
4197
4198 /* left hand side of A[ix] * B[iy] */
4199 tmpx = a->dp[ix];
4200
4201 /* alias to the address of where the digits will be stored */
4202 tmpt = &(t.dp[digs]);
4203
4204 /* alias for where to read the right hand side from */
4205 tmpy = b->dp + (digs - ix);
4206
4207 for (iy = digs - ix; iy < pb; iy++) {
4208 /* calculate the double precision result */
4209 r = ((mp_word)*tmpt) +
4210 ((mp_word)tmpx) * ((mp_word)*tmpy++) +
4211 ((mp_word) u);
4212
4213 /* get the lower part */
4214 *tmpt++ = (mp_digit) (r & ((mp_word) MP_MASK));
4215
4216 /* carry the carry */
4217 u = (mp_digit) (r >> ((mp_word) DIGIT_BIT));
4218 }
4219 *tmpt = u;
4220 }
4221 mp_clamp (&t);
4222 mp_exch (&t, c);
4223 mp_clear (&t);
4224 return MP_OKAY;
4225}
4226
4227
4228/* this is a modified version of fast_s_mul_digs that only produces
4229 * output digits *above* digs. See the comments for fast_s_mul_digs
4230 * to see how it works.
4231 *
4232 * This is used in the Barrett reduction since for one of the multiplications
4233 * only the higher digits were needed. This essentially halves the work.
4234 *
4235 * Based on Algorithm 14.12 on pp.595 of HAC.
4236 */
4237int fast_s_mp_mul_high_digs (mp_int * a, mp_int * b, mp_int * c, int digs)
4238{
4239 int olduse, res, pa, ix, iz;
4240 /* uses dynamic memory and slower */
4241 WC_DECLARE_VAR(W, mp_digit, MP_WARRAY, 0);
4242 mp_word _W;
4243
4244 if (a->dp == NULL) { /* JRB, avoid reading uninitialized values */
4245 return MP_VAL;
4246 }
4247
4248 /* grow the destination as required */
4249 pa = a->used + b->used;
4250 if (c->alloc < pa) {
4251 if ((res = mp_grow (c, pa)) != MP_OKAY) {
4252 return res;
4253 }
4254 }
4255
4256 if (pa > (int)MP_WARRAY)
4257 return MP_RANGE; /* TAO range check */
4258
4259 WC_ALLOC_VAR_EX(W, mp_digit, pa, NULL, DYNAMIC_TYPE_BIGINT,
4260 return MP_MEM);
4261
4262 /* number of output digits to produce */
4263 _W = 0;
4264 for (ix = digs; ix < pa; ix++) { /* JRB, have a->dp check at top of function*/
4265 int tx, ty, iy;
4266 mp_digit *tmpx, *tmpy;
4267
4268 /* get offsets into the two bignums */
4269 ty = MIN(b->used-1, ix);
4270 tx = ix - ty;
4271
4272 /* setup temp aliases */
4273 tmpx = a->dp + tx;
4274 tmpy = b->dp + ty;
4275
4276 /* this is the number of times the loop will iterate, essentially its
4277 while (tx++ < a->used && ty-- >= 0) { ... }
4278 */
4279 iy = MIN(a->used-tx, ty+1);
4280
4281 /* execute loop */
4282 for (iz = 0; iz < iy; iz++) {
4283 _W += ((mp_word)*tmpx++)*((mp_word)*tmpy--);
4284 }
4285
4286 /* store term */
4287 W[ix] = (mp_digit)(((mp_digit)_W) & MP_MASK);
4288
4289 /* make next carry */
4290 _W = _W >> ((mp_word)DIGIT_BIT);
4291 }
4292
4293 /* setup dest */
4294 olduse = c->used;
4295 c->used = pa;
4296
4297 {
4298 mp_digit *tmpc;
4299
4300 tmpc = c->dp + digs;
4301 for (ix = digs; ix < pa; ix++) { /* TAO, <= could potentially overwrite */
4302 /* now extract the previous digit [below the carry] */
4303 *tmpc++ = W[ix];
4304 }
4305
4306 /* clear unused digits [that existed in the old copy of c] */
4307 for (; ix < olduse; ix++) {
4308 *tmpc++ = 0;
4309 }
4310 }
4311 mp_clamp (c);
4312
4313 WC_FREE_VAR_EX(W, NULL, DYNAMIC_TYPE_BIGINT);
4314
4315 return MP_OKAY;
4316}
4317
4318
4319#ifndef MP_SET_CHUNK_BITS
4320 #define MP_SET_CHUNK_BITS 4
4321#endif
4322int mp_set_int (mp_int * a, unsigned long b)
4323{
4324 int x, res;
4325
4326 /* use direct mp_set if b is less than mp_digit max */
4327 if (b < MP_DIGIT_MAX) {
4328 return mp_set (a, (mp_digit)b);
4329 }
4330
4331 mp_zero (a);
4332
4333 /* set chunk bits at a time */
4334 for (x = 0; x < (int)(sizeof(b) * 8) / MP_SET_CHUNK_BITS; x++) {
4335 /* shift the number up chunk bits */
4336 if ((res = mp_mul_2d (a, MP_SET_CHUNK_BITS, a)) != MP_OKAY) {
4337 return res;
4338 }
4339
4340 /* OR in the top bits of the source */
4341 a->dp[0] |= (b >> ((sizeof(b) * 8) - MP_SET_CHUNK_BITS)) &
4342 ((1 << MP_SET_CHUNK_BITS) - 1);
4343
4344 /* shift the source up to the next chunk bits */
4345 b <<= MP_SET_CHUNK_BITS;
4346
4347 /* ensure that digits are not clamped off */
4348 a->used += 1;
4349 }
4350 mp_clamp (a);
4351 return MP_OKAY;
4352}
4353
4354
4355#if defined(WOLFSSL_KEY_GEN) || defined(HAVE_ECC) || !defined(NO_RSA) || \
4356 !defined(NO_DSA) | !defined(NO_DH)
4357
4358/* c = a * a (mod b) */
4359int mp_sqrmod (mp_int * a, mp_int * b, mp_int * c)
4360{
4361 int res;
4362 mp_int t;
4363
4364 if ((res = mp_init (&t)) != MP_OKAY) {
4365 return res;
4366 }
4367
4368 if ((res = mp_sqr (a, &t)) != MP_OKAY) {
4369 mp_clear (&t);
4370 return res;
4371 }
4372 res = mp_mod (&t, b, c);
4373 mp_clear (&t);
4374 return res;
4375}
4376
4377#endif
4378
4379
4380#if defined(HAVE_ECC) || !defined(NO_PWDBASED) || defined(WOLFSSL_SNIFFER) || \
4381 defined(WOLFSSL_HAVE_WOLFSCEP) || defined(WOLFSSL_KEY_GEN) || \
4382 defined(OPENSSL_EXTRA) || defined(WC_RSA_BLINDING) || \
4383 (!defined(NO_RSA) && !defined(NO_RSA_BOUNDS_CHECK))
4384
4385/* single digit addition */
4386int mp_add_d (mp_int* a, mp_digit b, mp_int* c) /* //NOLINT(misc-no-recursion) */
4387{
4388 int res, ix, oldused;
4389 mp_digit *tmpa, *tmpc, mu;
4390
4391 if (b > MP_DIGIT_MAX) return MP_VAL;
4392
4393 /* grow c as required */
4394 if (c->alloc < a->used + 1) {
4395 if ((res = mp_grow(c, a->used + 1)) != MP_OKAY) {
4396 return res;
4397 }
4398 }
4399
4400 /* if a is negative and |a| >= b, call c = |a| - b */
4401 if (a->sign == MP_NEG && (a->used > 1 || a->dp[0] >= b)) {
4402 /* temporarily fix sign of a */
4403 a->sign = MP_ZPOS;
4404
4405 /* c = |a| - b */
4406 res = mp_sub_d(a, b, c);
4407
4408 /* fix sign */
4409 a->sign = c->sign = MP_NEG;
4410
4411 /* clamp */
4412 mp_clamp(c);
4413
4414 return res;
4415 }
4416
4417 /* old number of used digits in c */
4418 oldused = c->used;
4419
4420 /* source alias */
4421 tmpa = a->dp;
4422
4423 /* destination alias */
4424 tmpc = c->dp;
4425
4426 if (tmpa == NULL || tmpc == NULL) {
4427 return MP_MEM;
4428 }
4429
4430 /* if a is positive */
4431 if (a->sign == MP_ZPOS) {
4432 /* add digit, after this we're propagating
4433 * the carry.
4434 */
4435 *tmpc = *tmpa++ + b;
4436 mu = *tmpc >> DIGIT_BIT;
4437 *tmpc++ &= MP_MASK;
4438
4439 /* now handle rest of the digits */
4440 for (ix = 1; ix < a->used; ix++) {
4441 *tmpc = *tmpa++ + mu;
4442 mu = *tmpc >> DIGIT_BIT;
4443 *tmpc++ &= MP_MASK;
4444 }
4445 /* set final carry */
4446 if (ix < c->alloc) {
4447 ix++;
4448 *tmpc++ = mu;
4449 }
4450
4451 /* setup size */
4452 c->used = a->used + 1;
4453 } else {
4454 /* a was negative and |a| < b */
4455 c->used = 1;
4456
4457 /* the result is a single digit */
4458 if (a->used == 1) {
4459 *tmpc++ = b - a->dp[0];
4460 } else {
4461 *tmpc++ = b;
4462 }
4463
4464 /* setup count so the clearing of oldused
4465 * can fall through correctly
4466 */
4467 ix = 1;
4468 }
4469
4470 /* sign always positive */
4471 c->sign = MP_ZPOS;
4472
4473 /* now zero to oldused */
4474 while (ix++ < oldused) {
4475 *tmpc++ = 0;
4476 }
4477 mp_clamp(c);
4478
4479 return MP_OKAY;
4480}
4481
4482
4483/* single digit subtraction */
4484int mp_sub_d (mp_int * a, mp_digit b, mp_int * c) /* //NOLINT(misc-no-recursion) */
4485{
4486 mp_digit *tmpa, *tmpc, mu;
4487 int res, ix, oldused;
4488
4489 if (b > MP_MASK) return MP_VAL;
4490
4491 /* grow c as required */
4492 if (c->alloc < a->used + 1) {
4493 if ((res = mp_grow(c, a->used + 1)) != MP_OKAY) {
4494 return res;
4495 }
4496 }
4497
4498 /* if a is negative just do an unsigned
4499 * addition [with fudged signs]
4500 */
4501 if (a->sign == MP_NEG) {
4502 a->sign = MP_ZPOS;
4503 res = mp_add_d(a, b, c);
4504 a->sign = c->sign = MP_NEG;
4505
4506 /* clamp */
4507 mp_clamp(c);
4508
4509 return res;
4510 }
4511
4512 /* setup regs */
4513 oldused = c->used;
4514 tmpa = a->dp;
4515 tmpc = c->dp;
4516
4517 if (tmpa == NULL || tmpc == NULL) {
4518 return MP_MEM;
4519 }
4520
4521 /* if a <= b simply fix the single digit */
4522 if ((a->used == 1 && a->dp[0] <= b) || a->used == 0) {
4523 if (a->used == 1) {
4524 *tmpc++ = b - *tmpa;
4525 } else {
4526 *tmpc++ = b;
4527 }
4528 ix = 1;
4529
4530 /* negative/1digit */
4531 c->sign = MP_NEG;
4532 c->used = 1;
4533 } else {
4534 /* positive/size */
4535 c->sign = MP_ZPOS;
4536 c->used = a->used;
4537
4538 /* subtract first digit */
4539 *tmpc = *tmpa++ - b;
4540 mu = *tmpc >> (sizeof(mp_digit) * CHAR_BIT - 1);
4541 *tmpc++ &= MP_MASK;
4542
4543 /* handle rest of the digits */
4544 for (ix = 1; ix < a->used; ix++) {
4545 *tmpc = *tmpa++ - mu;
4546 mu = *tmpc >> (sizeof(mp_digit) * CHAR_BIT - 1);
4547 *tmpc++ &= MP_MASK;
4548 }
4549 }
4550
4551 /* zero excess digits */
4552 while (ix++ < oldused) {
4553 *tmpc++ = 0;
4554 }
4555 mp_clamp(c);
4556 return MP_OKAY;
4557}
4558
4559#endif /* defined(HAVE_ECC) || !defined(NO_PWDBASED) */
4560
4561
4562#if defined(WOLFSSL_KEY_GEN) || defined(HAVE_COMP_KEY) || defined(HAVE_ECC) || \
4563 defined(DEBUG_WOLFSSL) || !defined(NO_RSA) || !defined(NO_DSA) || \
4564 !defined(NO_DH) || defined(WC_MP_TO_RADIX)
4565
4566static const int lnz[16] = {
4567 4, 0, 1, 0, 2, 0, 1, 0, 3, 0, 1, 0, 2, 0, 1, 0
4568};
4569
4570/* Counts the number of lsbs which are zero before the first zero bit */
4571int mp_cnt_lsb(mp_int *a)
4572{
4573 int x;
4574 mp_digit q = 0, qq;
4575
4576 /* easy out */
4577 if (mp_iszero(a) == MP_YES) {
4578 return 0;
4579 }
4580
4581 /* scan lower digits until non-zero */
4582 for (x = 0; x < a->used && a->dp[x] == 0; x++) {}
4583 if (a->dp)
4584 q = a->dp[x];
4585 x *= DIGIT_BIT;
4586
4587 /* now scan this digit until a 1 is found */
4588 if ((q & 1) == 0) {
4589 do {
4590 qq = q & 15;
4591 x += lnz[qq];
4592 q >>= 4;
4593 } while (qq == 0);
4594 }
4595 return x;
4596}
4597
4598
4599
4600
4601static int s_is_power_of_two(mp_digit b, int *p)
4602{
4603 int x;
4604
4605 /* fast return if no power of two */
4606 if ((b==0) || (b & (b-1))) {
4607 return 0;
4608 }
4609
4610 for (x = 0; x < DIGIT_BIT; x++) {
4611 if (b == (((mp_digit)1)<<x)) {
4612 *p = x;
4613 return 1;
4614 }
4615 }
4616 return 0;
4617}
4618
4619/* single digit division (based on routine from MPI) */
4620static int mp_div_d (mp_int * a, mp_digit b, mp_int * c, mp_digit * d)
4621{
4622 mp_int q;
4623 mp_word w;
4624 mp_digit t;
4625 int res = MP_OKAY, ix;
4626
4627 /* cannot divide by zero */
4628 if (b == 0) {
4629 return MP_VAL;
4630 }
4631
4632 /* quick outs */
4633 if (b == 1 || mp_iszero(a) == MP_YES) {
4634 if (d != NULL) {
4635 *d = 0;
4636 }
4637 if (c != NULL) {
4638 return mp_copy(a, c);
4639 }
4640 return MP_OKAY;
4641 }
4642
4643 /* power of two ? */
4644 if (s_is_power_of_two(b, &ix) == 1) {
4645 if (d != NULL) {
4646 *d = a->dp[0] & ((((mp_digit)1)<<ix) - 1);
4647 }
4648 if (c != NULL) {
4649 return mp_div_2d(a, ix, c, NULL);
4650 }
4651 return MP_OKAY;
4652 }
4653
4654#ifdef BN_MP_DIV_3_C
4655 /* three? */
4656 if (b == 3) {
4657 return mp_div_3(a, c, d);
4658 }
4659#endif
4660
4661 /* no easy answer [c'est la vie]. Just division */
4662 if (c != NULL) {
4663 if ((res = mp_init_size(&q, a->used)) != MP_OKAY) {
4664 return res;
4665 }
4666
4667 q.used = a->used;
4668 q.sign = a->sign;
4669 }
4670 else {
4671 if ((res = mp_init(&q)) != MP_OKAY) {
4672 return res;
4673 }
4674 }
4675
4676 w = 0;
4677
4678 if (a->used == 0)
4679 return MP_VAL;
4680
4681 for (ix = a->used - 1; ix >= 0; ix--) {
4682 w = (w << ((mp_word)DIGIT_BIT)) | ((mp_word)a->dp[ix]);
4683
4684 if (w >= b) {
4685#ifdef WOLFSSL_LINUXKM
4686 t = (mp_digit)w;
4687 /* Linux kernel macro for in-place 64 bit integer division. */
4688 do_div(t, b);
4689#else
4690 t = (mp_digit)(w / b);
4691#endif
4692 w -= ((mp_word)t) * ((mp_word)b);
4693 } else {
4694 t = 0;
4695 }
4696 if (c != NULL)
4697 q.dp[ix] = (mp_digit)t;
4698 }
4699
4700 if (d != NULL) {
4701 *d = (mp_digit)w;
4702 }
4703
4704 if (c != NULL) {
4705 mp_clamp(&q);
4706 mp_exch(&q, c);
4707 }
4708 mp_clear(&q);
4709
4710 return res;
4711}
4712
4713
4714int mp_mod_d (mp_int * a, mp_digit b, mp_digit * c)
4715{
4716 return mp_div_d(a, b, NULL, c);
4717}
4718
4719#endif /* WOLFSSL_KEY_GEN || HAVE_COMP_KEY || HAVE_ECC || DEBUG_WOLFSSL */
4720
4721#if (defined(WOLFSSL_KEY_GEN) && !defined(NO_RSA)) || !defined(NO_DH) || !defined(NO_DSA)
4722
4723const FLASH_QUALIFIER mp_digit ltm_prime_tab[PRIME_SIZE] = {
4724 0x0002, 0x0003, 0x0005, 0x0007, 0x000B, 0x000D, 0x0011, 0x0013,
4725 0x0017, 0x001D, 0x001F, 0x0025, 0x0029, 0x002B, 0x002F, 0x0035,
4726 0x003B, 0x003D, 0x0043, 0x0047, 0x0049, 0x004F, 0x0053, 0x0059,
4727 0x0061, 0x0065, 0x0067, 0x006B, 0x006D, 0x0071, 0x007F,
4728#ifndef MP_8BIT
4729 0x0083,
4730 0x0089, 0x008B, 0x0095, 0x0097, 0x009D, 0x00A3, 0x00A7, 0x00AD,
4731 0x00B3, 0x00B5, 0x00BF, 0x00C1, 0x00C5, 0x00C7, 0x00D3, 0x00DF,
4732 0x00E3, 0x00E5, 0x00E9, 0x00EF, 0x00F1, 0x00FB, 0x0101, 0x0107,
4733 0x010D, 0x010F, 0x0115, 0x0119, 0x011B, 0x0125, 0x0133, 0x0137,
4734
4735 0x0139, 0x013D, 0x014B, 0x0151, 0x015B, 0x015D, 0x0161, 0x0167,
4736 0x016F, 0x0175, 0x017B, 0x017F, 0x0185, 0x018D, 0x0191, 0x0199,
4737 0x01A3, 0x01A5, 0x01AF, 0x01B1, 0x01B7, 0x01BB, 0x01C1, 0x01C9,
4738 0x01CD, 0x01CF, 0x01D3, 0x01DF, 0x01E7, 0x01EB, 0x01F3, 0x01F7,
4739 0x01FD, 0x0209, 0x020B, 0x021D, 0x0223, 0x022D, 0x0233, 0x0239,
4740 0x023B, 0x0241, 0x024B, 0x0251, 0x0257, 0x0259, 0x025F, 0x0265,
4741 0x0269, 0x026B, 0x0277, 0x0281, 0x0283, 0x0287, 0x028D, 0x0293,
4742 0x0295, 0x02A1, 0x02A5, 0x02AB, 0x02B3, 0x02BD, 0x02C5, 0x02CF,
4743
4744 0x02D7, 0x02DD, 0x02E3, 0x02E7, 0x02EF, 0x02F5, 0x02F9, 0x0301,
4745 0x0305, 0x0313, 0x031D, 0x0329, 0x032B, 0x0335, 0x0337, 0x033B,
4746 0x033D, 0x0347, 0x0355, 0x0359, 0x035B, 0x035F, 0x036D, 0x0371,
4747 0x0373, 0x0377, 0x038B, 0x038F, 0x0397, 0x03A1, 0x03A9, 0x03AD,
4748 0x03B3, 0x03B9, 0x03C7, 0x03CB, 0x03D1, 0x03D7, 0x03DF, 0x03E5,
4749 0x03F1, 0x03F5, 0x03FB, 0x03FD, 0x0407, 0x0409, 0x040F, 0x0419,
4750 0x041B, 0x0425, 0x0427, 0x042D, 0x043F, 0x0443, 0x0445, 0x0449,
4751 0x044F, 0x0455, 0x045D, 0x0463, 0x0469, 0x047F, 0x0481, 0x048B,
4752
4753 0x0493, 0x049D, 0x04A3, 0x04A9, 0x04B1, 0x04BD, 0x04C1, 0x04C7,
4754 0x04CD, 0x04CF, 0x04D5, 0x04E1, 0x04EB, 0x04FD, 0x04FF, 0x0503,
4755 0x0509, 0x050B, 0x0511, 0x0515, 0x0517, 0x051B, 0x0527, 0x0529,
4756 0x052F, 0x0551, 0x0557, 0x055D, 0x0565, 0x0577, 0x0581, 0x058F,
4757 0x0593, 0x0595, 0x0599, 0x059F, 0x05A7, 0x05AB, 0x05AD, 0x05B3,
4758 0x05BF, 0x05C9, 0x05CB, 0x05CF, 0x05D1, 0x05D5, 0x05DB, 0x05E7,
4759 0x05F3, 0x05FB, 0x0607, 0x060D, 0x0611, 0x0617, 0x061F, 0x0623,
4760 0x062B, 0x062F, 0x063D, 0x0641, 0x0647, 0x0649, 0x064D, 0x0653
4761#endif
4762};
4763
4764
4765/* Miller-Rabin test of "a" to the base of "b" as described in
4766 * HAC pp. 139 Algorithm 4.24
4767 *
4768 * Sets result to 0 if definitely composite or 1 if probably prime.
4769 * Randomly the chance of error is no more than 1/4 and often
4770 * very much lower.
4771 */
4772static int mp_prime_miller_rabin (mp_int * a, mp_int * b, int *result)
4773{
4774 mp_int n1, y, r;
4775 int s, j, err;
4776
4777 /* default */
4778 *result = MP_NO;
4779
4780 /* ensure b > 1 */
4781 if (mp_cmp_d(b, 1) != MP_GT) {
4782 return MP_VAL;
4783 }
4784
4785 /* get n1 = a - 1 */
4786 if ((err = mp_init_copy (&n1, a)) != MP_OKAY) {
4787 return err;
4788 }
4789 if ((err = mp_sub_d (&n1, 1, &n1)) != MP_OKAY) {
4790 goto LBL_N1;
4791 }
4792
4793 /* set 2**s * r = n1 */
4794 if ((err = mp_init_copy (&r, &n1)) != MP_OKAY) {
4795 goto LBL_N1;
4796 }
4797
4798 /* count the number of least significant bits
4799 * which are zero
4800 */
4801 s = mp_cnt_lsb(&r);
4802
4803 /* now divide n - 1 by 2**s */
4804 if ((err = mp_div_2d (&r, s, &r, NULL)) != MP_OKAY) {
4805 goto LBL_R;
4806 }
4807
4808 /* compute y = b**r mod a */
4809 if ((err = mp_init (&y)) != MP_OKAY) {
4810 goto LBL_R;
4811 }
4812#if defined(WOLFSSL_HAVE_SP_RSA) || defined(WOLFSSL_HAVE_SP_DH)
4813#ifndef WOLFSSL_SP_NO_2048
4814 if (mp_count_bits(a) == 1024 && mp_isodd(a))
4815 err = sp_ModExp_1024(b, &r, a, &y);
4816 else if (mp_count_bits(a) == 2048 && mp_isodd(a))
4817 err = sp_ModExp_2048(b, &r, a, &y);
4818 else
4819#endif
4820#ifndef WOLFSSL_SP_NO_3072
4821 if (mp_count_bits(a) == 1536 && mp_isodd(a))
4822 err = sp_ModExp_1536(b, &r, a, &y);
4823 else if (mp_count_bits(a) == 3072 && mp_isodd(a))
4824 err = sp_ModExp_3072(b, &r, a, &y);
4825 else
4826#endif
4827#ifdef WOLFSSL_SP_4096
4828 if (mp_count_bits(a) == 4096 && mp_isodd(a))
4829 err = sp_ModExp_4096(b, &r, a, &y);
4830 else
4831#endif
4832#endif
4833 err = mp_exptmod (b, &r, a, &y);
4834 if (err != MP_OKAY)
4835 goto LBL_Y;
4836
4837 /* if y != 1 and y != n1 do */
4838 if (mp_cmp_d (&y, 1) != MP_EQ && mp_cmp (&y, &n1) != MP_EQ) {
4839 j = 1;
4840 /* while j <= s-1 and y != n1 */
4841 while ((j <= (s - 1)) && mp_cmp (&y, &n1) != MP_EQ) {
4842 if ((err = mp_sqrmod (&y, a, &y)) != MP_OKAY) {
4843 goto LBL_Y;
4844 }
4845
4846 /* if y == 1 then composite */
4847 if (mp_cmp_d (&y, 1) == MP_EQ) {
4848 goto LBL_Y;
4849 }
4850
4851 ++j;
4852 }
4853
4854 /* if y != n1 then composite */
4855 if (mp_cmp (&y, &n1) != MP_EQ) {
4856 goto LBL_Y;
4857 }
4858 }
4859
4860 /* probably prime now */
4861 *result = MP_YES;
4862LBL_Y:mp_clear (&y);
4863LBL_R:mp_clear (&r);
4864LBL_N1:mp_clear (&n1);
4865 return err;
4866}
4867
4868
4869/* determines if an integers is divisible by one
4870 * of the first PRIME_SIZE primes or not
4871 *
4872 * sets result to 0 if not, 1 if yes
4873 */
4874static int mp_prime_is_divisible (mp_int * a, int *result)
4875{
4876 int err, ix;
4877 mp_digit res;
4878
4879 /* default to not */
4880 *result = MP_NO;
4881
4882 for (ix = 0; ix < PRIME_SIZE; ix++) {
4883 /* what is a mod LBL_prime_tab[ix] */
4884 if ((err = mp_mod_d (a, ltm_prime_tab[ix], &res)) != MP_OKAY) {
4885 return err;
4886 }
4887
4888 /* is the residue zero? */
4889 if (res == 0) {
4890 *result = MP_YES;
4891 return MP_OKAY;
4892 }
4893 }
4894
4895 return MP_OKAY;
4896}
4897
4898/*
4899 * Sets result to 1 if probably prime, 0 otherwise
4900 */
4901int mp_prime_is_prime (mp_int * a, int t, int *result)
4902{
4903 mp_int b;
4904 int ix, err, res;
4905
4906 /* default to no */
4907 *result = MP_NO;
4908
4909 /* valid value of t? */
4910 if (t <= 0 || t > PRIME_SIZE) {
4911 return MP_VAL;
4912 }
4913
4914 if (mp_isone(a)) {
4915 *result = MP_NO;
4916 return MP_OKAY;
4917 }
4918
4919 /* is the input equal to one of the primes in the table? */
4920 for (ix = 0; ix < PRIME_SIZE; ix++) {
4921 if (mp_cmp_d(a, ltm_prime_tab[ix]) == MP_EQ) {
4922 *result = MP_YES;
4923 return MP_OKAY;
4924 }
4925 }
4926
4927 /* first perform trial division */
4928 if ((err = mp_prime_is_divisible (a, &res)) != MP_OKAY) {
4929 return err;
4930 }
4931
4932 /* return if it was trivially divisible */
4933 if (res == MP_YES) {
4934 return MP_OKAY;
4935 }
4936
4937 /* now perform the miller-rabin rounds */
4938 if ((err = mp_init (&b)) != MP_OKAY) {
4939 return err;
4940 }
4941
4942 for (ix = 0; ix < t; ix++) {
4943 /* set the prime */
4944 if ((err = mp_set (&b, ltm_prime_tab[ix])) != MP_OKAY) {
4945 goto LBL_B;
4946 }
4947
4948 if ((err = mp_prime_miller_rabin (a, &b, &res)) != MP_OKAY) {
4949 goto LBL_B;
4950 }
4951
4952 if (res == MP_NO) {
4953 goto LBL_B;
4954 }
4955 }
4956
4957 /* passed the test */
4958 *result = MP_YES;
4959LBL_B:mp_clear (&b);
4960 return err;
4961}
4962
4963
4964/*
4965 * Sets result to 1 if probably prime, 0 otherwise
4966 */
4967int mp_prime_is_prime_ex (mp_int * a, int t, int *result, WC_RNG *rng)
4968{
4969 mp_int b, c;
4970 int ix, err, res;
4971 byte* base = NULL;
4972 word32 bitSz = 0;
4973 word32 baseSz = 0;
4974
4975 /* default to no */
4976 *result = MP_NO;
4977
4978 /* valid value of t? */
4979 if (t <= 0 || t > PRIME_SIZE) {
4980 return MP_VAL;
4981 }
4982
4983 if (a->sign == MP_NEG) {
4984 return MP_VAL;
4985 }
4986
4987 if (mp_isone(a)) {
4988 *result = MP_NO;
4989 return MP_OKAY;
4990 }
4991
4992 /* is the input equal to one of the primes in the table? */
4993 for (ix = 0; ix < PRIME_SIZE; ix++) {
4994 if (mp_cmp_d(a, ltm_prime_tab[ix]) == MP_EQ) {
4995 *result = MP_YES;
4996 return MP_OKAY;
4997 }
4998 }
4999
5000 /* first perform trial division */
5001 if ((err = mp_prime_is_divisible (a, &res)) != MP_OKAY) {
5002 return err;
5003 }
5004
5005 /* return if it was trivially divisible */
5006 if (res == MP_YES) {
5007 return MP_OKAY;
5008 }
5009
5010 /* now perform the miller-rabin rounds */
5011 if ((err = mp_init (&b)) != MP_OKAY) {
5012 return err;
5013 }
5014 if ((err = mp_init (&c)) != MP_OKAY) {
5015 mp_clear(&b);
5016 return err;
5017 }
5018
5019 bitSz = mp_count_bits(a);
5020 baseSz = (bitSz / 8) + ((bitSz % 8) ? 1 : 0);
5021 bitSz %= 8;
5022
5023 base = (byte*)XMALLOC(baseSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
5024 if (base == NULL) {
5025 err = MP_MEM;
5026 goto LBL_B;
5027 }
5028
5029 if ((err = mp_sub_d(a, 2, &c)) != MP_OKAY) {
5030 goto LBL_B;
5031 }
5032
5033 /* now do a miller rabin with up to t random numbers, this should
5034 * give a (1/4)^t chance of a false prime. */
5035 for (ix = 0; ix < t; ix++) {
5036 /* Set a test candidate. */
5037 if ((err = wc_RNG_GenerateBlock(rng, base, baseSz)) != 0) {
5038 goto LBL_B;
5039 }
5040
5041 /* Clear bits higher than those in a. */
5042 if (bitSz > 0) {
5043 base[0] &= (1 << bitSz) - 1;
5044 }
5045
5046 if ((err = mp_read_unsigned_bin(&b, base, baseSz)) != MP_OKAY) {
5047 goto LBL_B;
5048 }
5049
5050 if (mp_cmp_d(&b, 2) != MP_GT || mp_cmp(&b, &c) != MP_LT) {
5051 ix--;
5052 continue;
5053 }
5054
5055 if ((err = mp_prime_miller_rabin (a, &b, &res)) != MP_OKAY) {
5056 goto LBL_B;
5057 }
5058
5059 if (res == MP_NO) {
5060 goto LBL_B;
5061 }
5062 }
5063
5064 /* passed the test */
5065 *result = MP_YES;
5066LBL_B:mp_clear (&b);
5067 mp_clear (&c);
5068 XFREE(base, NULL, DYNAMIC_TYPE_TMP_BUFFER);
5069 return err;
5070}
5071
5072#endif /* (WOLFSSL_KEY_GEN && !NO_RSA) || !NO_DH || !NO_DSA */
5073
5074#if defined(WOLFSSL_KEY_GEN) && (!defined(NO_DH) || !defined(NO_DSA))
5075
5076static const int USE_BBS = 1;
5077
5078int mp_rand_prime(mp_int* a, int len, WC_RNG* rng, void* heap)
5079{
5080 int err, res, type;
5081 byte* buf;
5082
5083 if (a == NULL || rng == NULL)
5084 return MP_VAL;
5085
5086 /* get type */
5087 if (len < 0) {
5088 type = USE_BBS;
5089 len = -len;
5090 } else {
5091 type = 0;
5092 }
5093
5094 /* allow sizes between 2 and 512 bytes for a prime size */
5095 if (len < 2 || len > 512) {
5096 return MP_VAL;
5097 }
5098
5099 /* allocate buffer to work with */
5100 buf = (byte*)XMALLOC(len, heap, DYNAMIC_TYPE_RSA);
5101 if (buf == NULL) {
5102 return MP_MEM;
5103 }
5104 XMEMSET(buf, 0, len);
5105
5106 do {
5107#ifdef SHOW_GEN
5108 printf(".");
5109 fflush(stdout);
5110#endif
5111 /* generate value */
5112 err = wc_RNG_GenerateBlock(rng, buf, len);
5113 if (err != 0) {
5114 XFREE(buf, heap, DYNAMIC_TYPE_RSA);
5115 return err;
5116 }
5117
5118 /* munge bits */
5119 buf[0] |= 0x80 | 0x40;
5120 buf[len-1] |= 0x01 | ((type & USE_BBS) ? 0x02 : 0x00);
5121
5122 /* load value */
5123 if ((err = mp_read_unsigned_bin(a, buf, len)) != MP_OKAY) {
5124 XFREE(buf, heap, DYNAMIC_TYPE_RSA);
5125 return err;
5126 }
5127
5128 /* test */
5129 /* Running Miller-Rabin up to 3 times gives us a 2^{-80} chance
5130 * of a 1024-bit candidate being a false positive, when it is our
5131 * prime candidate. (Note 4.49 of Handbook of Applied Cryptography.)
5132 * Using 8 because we've always used 8. */
5133 if ((err = mp_prime_is_prime_ex(a, 8, &res, rng)) != MP_OKAY) {
5134 XFREE(buf, heap, DYNAMIC_TYPE_RSA);
5135 return err;
5136 }
5137 } while (res == MP_NO);
5138
5139 XMEMSET(buf, 0, len);
5140 XFREE(buf, heap, DYNAMIC_TYPE_RSA);
5141
5142 return MP_OKAY;
5143}
5144
5145#endif
5146
5147#if defined(WOLFSSL_KEY_GEN)
5148
5149/* computes least common multiple as |a*b|/(a, b) */
5150int mp_lcm (mp_int * a, mp_int * b, mp_int * c)
5151{
5152 int res;
5153 mp_int t1, t2;
5154
5155 /* LCM of 0 and any number is undefined as 0 is not in the set of values
5156 * being used. */
5157 if (mp_iszero (a) == MP_YES || mp_iszero (b) == MP_YES) {
5158 return MP_VAL;
5159 }
5160
5161 if ((res = mp_init_multi (&t1, &t2, NULL, NULL, NULL, NULL)) != MP_OKAY) {
5162 return res;
5163 }
5164
5165 /* t1 = get the GCD of the two inputs */
5166 if ((res = mp_gcd (a, b, &t1)) != MP_OKAY) {
5167 goto LBL_T;
5168 }
5169
5170 /* divide the smallest by the GCD */
5171 if (mp_cmp_mag(a, b) == MP_LT) {
5172 /* store quotient in t2 such that t2 * b is the LCM */
5173 if ((res = mp_div(a, &t1, &t2, NULL)) != MP_OKAY) {
5174 goto LBL_T;
5175 }
5176 res = mp_mul(b, &t2, c);
5177 } else {
5178 /* store quotient in t2 such that t2 * a is the LCM */
5179 if ((res = mp_div(b, &t1, &t2, NULL)) != MP_OKAY) {
5180 goto LBL_T;
5181 }
5182 res = mp_mul(a, &t2, c);
5183 }
5184
5185 /* fix the sign to positive */
5186 c->sign = MP_ZPOS;
5187
5188LBL_T:
5189 mp_clear(&t1);
5190 mp_clear(&t2);
5191 return res;
5192}
5193
5194
5195
5196/* Greatest Common Divisor using the binary method */
5197int mp_gcd (mp_int * a, mp_int * b, mp_int * c)
5198{
5199 mp_int u, v;
5200 int k, u_lsb, v_lsb, res;
5201
5202 /* either zero than gcd is the largest */
5203 if (mp_iszero (a) == MP_YES) {
5204 /* GCD of 0 and 0 is undefined as all integers divide 0. */
5205 if (mp_iszero (b) == MP_YES) {
5206 return MP_VAL;
5207 }
5208 return mp_abs (b, c);
5209 }
5210 if (mp_iszero (b) == MP_YES) {
5211 return mp_abs (a, c);
5212 }
5213
5214 /* get copies of a and b we can modify */
5215 if ((res = mp_init_copy (&u, a)) != MP_OKAY) {
5216 return res;
5217 }
5218
5219 if ((res = mp_init_copy (&v, b)) != MP_OKAY) {
5220 goto LBL_U;
5221 }
5222
5223 /* must be positive for the remainder of the algorithm */
5224 u.sign = v.sign = MP_ZPOS;
5225
5226 /* B1. Find the common power of two for u and v */
5227 u_lsb = mp_cnt_lsb(&u);
5228 v_lsb = mp_cnt_lsb(&v);
5229 k = MIN(u_lsb, v_lsb);
5230
5231 if (k > 0) {
5232 /* divide the power of two out */
5233 if ((res = mp_div_2d(&u, k, &u, NULL)) != MP_OKAY) {
5234 goto LBL_V;
5235 }
5236
5237 if ((res = mp_div_2d(&v, k, &v, NULL)) != MP_OKAY) {
5238 goto LBL_V;
5239 }
5240 }
5241
5242 /* divide any remaining factors of two out */
5243 if (u_lsb != k) {
5244 if ((res = mp_div_2d(&u, u_lsb - k, &u, NULL)) != MP_OKAY) {
5245 goto LBL_V;
5246 }
5247 }
5248
5249 if (v_lsb != k) {
5250 if ((res = mp_div_2d(&v, v_lsb - k, &v, NULL)) != MP_OKAY) {
5251 goto LBL_V;
5252 }
5253 }
5254
5255 while (mp_iszero(&v) == MP_NO) {
5256 /* make sure v is the largest */
5257 if (mp_cmp_mag(&u, &v) == MP_GT) {
5258 /* swap u and v to make sure v is >= u */
5259 mp_exch(&u, &v);
5260 }
5261
5262 /* subtract smallest from largest */
5263 if ((res = s_mp_sub(&v, &u, &v)) != MP_OKAY) {
5264 goto LBL_V;
5265 }
5266
5267 /* Divide out all factors of two */
5268 if ((res = mp_div_2d(&v, mp_cnt_lsb(&v), &v, NULL)) != MP_OKAY) {
5269 goto LBL_V;
5270 }
5271 }
5272
5273 /* multiply by 2**k which we divided out at the beginning */
5274 if ((res = mp_mul_2d (&u, k, c)) != MP_OKAY) {
5275 goto LBL_V;
5276 }
5277 c->sign = MP_ZPOS;
5278 res = MP_OKAY;
5279LBL_V:mp_clear (&v);
5280LBL_U:mp_clear (&u);
5281 return res;
5282}
5283
5284#endif /* WOLFSSL_KEY_GEN */
5285
5286
5287#if !defined(NO_DSA) || defined(HAVE_ECC) || defined(WOLFSSL_KEY_GEN) || \
5288 defined(HAVE_COMP_KEY) || defined(WOLFSSL_DEBUG_MATH) || \
5289 defined(DEBUG_WOLFSSL) || defined(OPENSSL_EXTRA) || defined(WC_MP_TO_RADIX)
5290
5291/* chars used in radix conversions */
5292const char *mp_s_rmap = "0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ"
5293 "abcdefghijklmnopqrstuvwxyz+/";
5294#endif
5295
5296#if !defined(NO_DSA) || defined(HAVE_ECC) || defined(OPENSSL_EXTRA)
5297/* read a string [ASCII] in a given radix */
5298int mp_read_radix (mp_int * a, const char *str, int radix)
5299{
5300 int y, res, neg;
5301 char ch;
5302
5303 /* zero the digit bignum */
5304 mp_zero(a);
5305
5306 /* make sure the radix is ok */
5307 if (radix < MP_RADIX_BIN || radix > MP_RADIX_MAX) {
5308 return MP_VAL;
5309 }
5310
5311 /* if the leading digit is a
5312 * minus set the sign to negative.
5313 */
5314 if (*str == '-') {
5315 ++str;
5316 neg = MP_NEG;
5317 } else {
5318 neg = MP_ZPOS;
5319 }
5320
5321 /* set the integer to the default of zero */
5322 mp_zero (a);
5323
5324 /* process each digit of the string */
5325 while (*str != '\0') {
5326 /* if the radix <= 36 the conversion is case insensitive
5327 * this allows numbers like 1AB and 1ab to represent the same value
5328 * [e.g. in hex]
5329 */
5330 ch = (radix <= 36) ? (char)XTOUPPER((unsigned char)*str) : *str;
5331 for (y = 0; y < 64; y++) {
5332 if (ch == mp_s_rmap[y]) {
5333 break;
5334 }
5335 }
5336
5337 /* if the char was found in the map
5338 * and is less than the given radix add it
5339 * to the number, otherwise exit the loop.
5340 */
5341 if (y < radix) {
5342 if ((res = mp_mul_d (a, (mp_digit) radix, a)) != MP_OKAY) {
5343 mp_zero(a);
5344 return res;
5345 }
5346 if ((res = mp_add_d (a, (mp_digit) y, a)) != MP_OKAY) {
5347 mp_zero(a);
5348 return res;
5349 }
5350 } else {
5351 break;
5352 }
5353 ++str;
5354 }
5355
5356 /* Skip whitespace at end of str */
5357 while (CharIsWhiteSpace(*str))
5358 ++str;
5359 /* if digit in isn't null term, then invalid character was found */
5360 if (*str != '\0') {
5361 mp_zero (a);
5362 return MP_VAL;
5363 }
5364
5365 /* set the sign only if a != 0 */
5366 if (mp_iszero(a) != MP_YES) {
5367 a->sign = neg;
5368 }
5369 return MP_OKAY;
5370}
5371#endif /* !defined(NO_DSA) || defined(HAVE_ECC) */
5372
5373#ifdef WC_MP_TO_RADIX
5374
5375/* returns size of ASCII representation */
5376int mp_radix_size (mp_int *a, int radix, int *size)
5377{
5378 int res, digs;
5379 mp_int t;
5380 mp_digit d;
5381
5382 *size = 0;
5383
5384 /* special case for binary */
5385 if (radix == MP_RADIX_BIN) {
5386 *size = mp_count_bits(a);
5387 if (*size == 0)
5388 *size = 1;
5389 *size += (a->sign == MP_NEG ? 1 : 0) + 1; /* "-" sign + null term */
5390 return MP_OKAY;
5391 }
5392
5393 /* make sure the radix is in range */
5394 if (radix < MP_RADIX_BIN || radix > MP_RADIX_MAX) {
5395 return MP_VAL;
5396 }
5397
5398 if (mp_iszero(a) == MP_YES) {
5399#ifndef WC_DISABLE_RADIX_ZERO_PAD
5400 if (radix == 16)
5401 *size = 3;
5402 else
5403#endif
5404 *size = 2;
5405 return MP_OKAY;
5406 }
5407
5408 /* digs is the digit count */
5409 digs = 0;
5410
5411 /* init a copy of the input */
5412 if ((res = mp_init_copy (&t, a)) != MP_OKAY) {
5413 return res;
5414 }
5415
5416 /* force temp to positive */
5417 t.sign = MP_ZPOS;
5418
5419 /* fetch out all of the digits */
5420 while (mp_iszero (&t) == MP_NO) {
5421 if ((res = mp_div_d (&t, (mp_digit) radix, &t, &d)) != MP_OKAY) {
5422 mp_clear (&t);
5423 return res;
5424 }
5425 ++digs;
5426 }
5427 mp_clear (&t);
5428
5429#ifndef WC_DISABLE_RADIX_ZERO_PAD
5430 /* For hexadecimal output, add zero padding when number of digits is odd */
5431 if ((digs & 1) && (radix == 16)) {
5432 ++digs;
5433 }
5434#endif
5435
5436 /* if it's negative add one for the sign */
5437 if (a->sign == MP_NEG) {
5438 ++digs;
5439 }
5440
5441 /* return digs + 1, the 1 is for the NULL byte that would be required. */
5442 *size = digs + 1;
5443 return MP_OKAY;
5444}
5445
5446/* stores a bignum as a ASCII string in a given radix (2..64) */
5447int mp_toradix (mp_int *a, char *str, int radix)
5448{
5449 int res, digs;
5450 mp_int t;
5451 mp_digit d;
5452 char *_s = str;
5453
5454 /* check range of the radix */
5455 if (radix < MP_RADIX_BIN || radix > MP_RADIX_MAX) {
5456 return MP_VAL;
5457 }
5458
5459 /* quick out if its zero */
5460 if (mp_iszero(a) == MP_YES) {
5461#ifndef WC_DISABLE_RADIX_ZERO_PAD
5462 if (radix == 16) {
5463 *str++ = '0';
5464 }
5465#endif
5466 *str++ = '0';
5467 *str = '\0';
5468 return MP_OKAY;
5469 }
5470
5471 if ((res = mp_init_copy (&t, a)) != MP_OKAY) {
5472 return res;
5473 }
5474
5475 /* if it is negative output a - */
5476 if (t.sign == MP_NEG) {
5477 ++_s;
5478 *str++ = '-';
5479 t.sign = MP_ZPOS;
5480 }
5481
5482 digs = 0;
5483 while (mp_iszero (&t) == MP_NO) {
5484 if ((res = mp_div_d (&t, (mp_digit) radix, &t, &d)) != MP_OKAY) {
5485 mp_clear (&t);
5486 return res;
5487 }
5488 *str++ = mp_s_rmap[d];
5489 ++digs;
5490 }
5491#ifndef WC_DISABLE_RADIX_ZERO_PAD
5492 /* For hexadecimal output, add zero padding when number of digits is odd */
5493 if ((digs & 1) && (radix == 16)) {
5494 *str++ = mp_s_rmap[0];
5495 ++digs;
5496 }
5497#endif
5498 /* reverse the digits of the string. In this case _s points
5499 * to the first digit [excluding the sign] of the number]
5500 */
5501 bn_reverse ((unsigned char *)_s, digs);
5502
5503 /* append a NULL so the string is properly terminated */
5504 *str = '\0';
5505
5506 mp_clear (&t);
5507 return MP_OKAY;
5508}
5509
5510#ifdef WOLFSSL_DEBUG_MATH
5511void mp_dump(const char* desc, mp_int* a, byte verbose)
5512{
5513 char *buffer;
5514 int size = a->alloc;
5515
5516 buffer = (char*)XMALLOC(size * sizeof(mp_digit) * 2, NULL, DYNAMIC_TYPE_TMP_BUFFER);
5517 if (buffer == NULL) {
5518 return;
5519 }
5520
5521 printf("%s: ptr=%p, used=%d, sign=%d, size=%d, mpd=%d\n",
5522 desc, a, a->used, a->sign, size, (int)sizeof(mp_digit));
5523
5524 mp_tohex(a, buffer);
5525 printf(" %s\n ", buffer);
5526
5527 if (verbose) {
5528 int i;
5529 for(i=0; i<a->alloc * (int)sizeof(mp_digit); i++) {
5530 printf("%02x ", *(((byte*)a->dp) + i));
5531 }
5532 printf("\n");
5533 }
5534
5535 XFREE(buffer, NULL, DYNAMIC_TYPE_TMP_BUFFER);
5536}
5537#endif /* WOLFSSL_DEBUG_MATH */
5538
5539#endif /* WC_MP_TO_RADIX */
5540
5541#endif /* WOLFSSL_SP_MATH */
5542
5543#endif /* !USE_FAST_MATH && USE_INTEGER_HEAP_MATH */
5544
5545#endif /* NO_BIG_INT */